18 Nov Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, InfoSec Strategies | Category - Pivot Point Security Trusted Information and Its Role in Validating Your Information Security Program January 19, 2024 By Richard Barrus Before you can make information security a strategic enabler for your business, you need a way to prove to clients, regulators, investo... Continue reading
16 Nov Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, Cybersecurity Maturity Model Certification (CMMC) CMMC 2.0 and the False Claims Act—Be Careful What You Sign! January 18, 2024 By Richard Barrus Among the biggest changes in the US Department of Defense (DoD)’s recent announcements about CMMC 2.0 is the rollback of requirements f... Continue reading
15 Nov Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, Cybersecurity Maturity Model Certification (CMMC) CMMC 2.0: What’s New and What’s Not for Orgs Handling CUI? January 18, 2024 By Richard Barrus The US Department of Defense (DoD)’s move from CMMC 1.0 to CMMC 2.0 has thus far been seen in a positive light by industry leaders and ... Continue reading
12 Nov Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, Cybersecurity Maturity Model Certification (CMMC) CMMC 2.0: What’s New and What’s Not at “Level 1” (FCI Only)? January 18, 2024 By Richard Barrus The shift from CMMC 1.0 to CMMC 2.0 based on the US Department of Defense (DoD)’s review of the program has garnered a lot of attention... Continue reading
08 Nov Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, InfoSec Strategies | Category - Pivot Point Security Operationalizing Your Information Security Strategy January 19, 2024 By Richard Barrus Once you have a clear, agreed vision for where you want information security to take your company, it’s time to operationalize your inf... Continue reading