News

“Enhance Section 4.0 (Self-Assessing Cybersecurity Risk with the Framework) to integrate guidance on how [Special Publication 800-30, revision 1] can be leveraged to perform the risk measurement ...
Defense Department CIO Teresa Takai. The Defense Department's plan to adopt NIST's risk management framework means that, for the first time, defense, intelligence and civilian federal agencies will ...
The final version of the NIST Risk Management Framework 2.0 is now available, providing government agencies and commercial enterprises alike with new guidance that aligns risk, privacy and cyber ...
NetCentrics Corporation, a leading provider of enterprise systems management and cybersecurity for the US government, has led the Department of Defense’s (DoD) first full implementation of the Risk ...
The Army adopted the Risk Management Framework in 2015. Since then, as has been the case in other Services, the process has been wrought with challenges including training, time to execute, number ...
The DoD requires risk management in most of its Cybersecurity Maturity Model Certification (CMMC) tiers. The CMMC applies to all the department’s more than 300,000 contractors. Even though this ...
According to Col. Donald Bray, the Army's acting cyber director, the Defense Department’s risk management framework (RMF) guidance was less about removing all traces of risk and more about ...
Cybersecurity evolves daily to counter ever-present threats posed by criminals, nation states, insiders and others. To address the changing threat landscape, the National Institute of Standards and ...
And in December, the Defense Innovation Unit and Cybersecurity Infrastructure and Security Administration signed a memorandum of understanding to collaborate on and improve cybersecurity initiatives, ...
Moving the Defense Department's authorization process for IT systems from the DOD Information Assurance Certification and Accreditation Process to the Risk Management Framework was supposed to ...
These three pillars of cybersecurity risk management need not stand alone. In fact, they all should be incorporated together in cybersecurity framework strategy to identify gaps, mitigate threats, and ...
Sentinel introduces the prioritization of cybersecurity controls based on current validated threats from authoritative sources, such as Critical Security Controls for Effective Cyber Defense ...