Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Article 28 - General Data Protection Regulation Act

The General Data Protection Regulation Act (GDPR) requires Data Controllers to establish a written agreement with the Data Processor stating the terms and conditions for the data processing activity. So, before getting into a contract with the Data Processor, a Data Processing Agreement must be signed between both parties regarding the conduct of processing personal data.

SIEM Use Cases for Compliance with GDPR

The era we live in requires the digitalization of all subjects interacting with people, from giant companies to small-scale organizations. It is unquestionable that this trend has made significant contributions to the data collection process. But the larger the volume of data collected, the greater the risk of a security breach. For this reason, it is essential to control the security and transparency of personal data.

Threat-Based Methodology: Auditing

This is the third post in the Threat-Based Methodology blog series. In the first post, we introduced Threat Based Methodology and the analysis conducted by the FedRAMP PMO and NIST. In that post, we ended by listing the top seven controls based on their Protection Value. The second post explored configuration settings in greater depth and explained how Devo supports the ability to meet the CM-6 control.

What is Cybersecurity Maturity Model Certification 2.0 (CMMC 2.0)?

The DoD or Department of Defense of the United States of America implements the CMMC or Cybersecurity Maturity Model Certification to standardize or normalize the overall preparedness for cybersecurity across the DIB (Defense Industrial Base) of the federal government against evolving threats.

Ukraine Russia Conflict Roundtable | 3/22/22 | NeoSystems

Join NeoSystems and leading government and industry cybersecurity executives for a roundtable discussion on the Ukraine Russia Conflict and its cybersecurity implications. We'll discuss Russian cyber activities and examine strategic initiatives to defend the United States against cyber-attacks. Topics Covered Include: Moderator: Bryan Ware – CEO and Founder, Next5, Entrepreneur, former Director of Cybersecurity, CISA

Create an ethics-by-design approach for data

Our VP for Data Ethics & Governance, Sophie Chase-Borthwick, was recently part of a panel – the PICCASO Special Interest Group. Sophie joined William Malcolm (Privacy Legal Director at Google), Radha Gohil (Data Ethics Strategy Lead at Shell), and Anne Woodley (Security Specialist at Microsoft) in untangling what data ethics actually means and how best to support it. Here we look at this in more detail.

#BigPictureCyber Town Hall With Chris Nissen, Founder & CEO, IntelWerks | 3/23/22 | NeoSystems

NeoSystems #BigPictureCyber Town Hall Series: Join NeoSystems’ Chief Information Security Officer, Ed Bassett, for our weekly #BigPictureCyber Town Hall designed for the Defense Industrial Base and GovCon community. Each session features special guests and offers an opportunity for attendees to ask questions regarding CMMC and cybersecurity. Topics covered include CMMC compliance requirements, cybersecurity news, how to prepare for CMMC certification, and the latest updates from the CMMC AB.