Cybersecurity Policy for Local Governments
Here is a sample high-level cybersecurity policy for a city, district, or county. It is designed to be a high-level statement adopted by...
That's Not the Way Things Work in Government
"That's not the way things work in government." This is the catch all excuse for not doing what needs to be done in the government. The...
Trump on Cybersecurity
Issue Statement from White House Making Our Military Strong Again “Cyberwarfare is an emerging battlefield, and we must take every...
Federal Cybersecurity Wage Gap
The Federal Government has had a long-term problem recruiting and keeping cyber security talent. One problem has been the wage gap...
Securing Apple OS X 10.10 (NIST)
NIST is Proud to Announce the Release of Special Publication 800-179, Guide to Securing Apple OS X 10.10 Systems for IT Professionals: A...
TU RMF Roles and Responsibilities (Part 1)
TU RMF Roles and Responsibilities (Part 1) People are a critical factor in any cyber security imitative. In this session we will cover...
Building and Maintaining a Successful RMF Program
TU Building and Maintaining a Successful RMF Program Starting or maintaining an effective and efficient risk management program (RMF)...
Introduction to NIST’s Risk Management Framework (RMF)
TU Introduction to NIST’s Risk Management Framework (RMF) StartFragmentThis introductory session will cover the basic steps of the Risk...
CIS Critical Security Controls v. 6.1
The Critical Security Controls for Effective Cyber Defense has been updated to version 6.1. This new version has a new two-level...
Cyber Security Certifications
People often ask, “What certifications are best in cyber security?” My answer is to follow the numbers. By that I mean do some research...