-
2:29
How Schellman Can Help With Your FedRAMP ATO
-
3:58
The Phases to the FedRAMP Process
-
4:59
The Risks of a Low-Cost Audit Partner
-
2:46
What to Expect from Your FedRAMP Penetration Test
-
Why National Skin Cancer Awareness Month Matters to Me
May is National Skin Cancer Awareness Month. Schellman's Chief Growth Officer Doug Barbin shares his personal experience and tips for avoiding melanoma—the silent but deadly disease.
-
CMMC 2.0 Scoping Insight: 2 Tips For Using PCI Context to Understand Your Potential Scope
As we prepare for the launch of CMMC, we explain how to use more familiar compliance territory to understand and shape your eventual CMMC scope.
-
Schellman First Take on the Cybersecurity Executive Order
Schellman's Doug Barbin provides a “First Take” on the new Presidential Executive Order on Improving the Nation's Cybersecurity Yesterday, on May 12th, President Biden issued the “Executive
-
How Much Will Your Audit Cost?
It All Starts with Defining Scope and Customer Commitment So your customer (or sales rep) told you that you need to conduct an external audit in order to win the business... Whether...
-
6:11
Control Mapping
-
5:04
FedRAMP Controls Categories - Low, Moderate, or High?
-
Artificial Intelligence: A relative reality
To differentiate what is marketing jargon from what CISOs can do with AI-enhanced products, security leaders were interviewed to find out which products embedded with AI deliver on their promises.
-
CMMC – the New Protocol Droid for DoD Compliance
US DoD has been working to revise funding procurement procedures DFARS. Most important are regulations which mandate that defense contractors meet NIST SP 800-171 standard that deals with CUI.
-
The Most Important Considerations in Building a DevSecOps Pipeline
Security Boulevard reached out to a panel of DevSecOps pros to learn more about key considerations and best practices for building a DevSecOps pipeline.
-
Inside-out analytics: Solving the enigmatic insider threat
To protect their corporations against data breach from internal and external sources, CISOs have a tool that is effective at identifying breaches but some employees might find it intrusive: analytics.
-
How Bots Can Tell When the C-Suite Is Lying
Companies are applying natural language processing (NLP), sentiment analysis and machine learning to the financial sector, evaluating earnings calls and other public meetings to unearth information.
-
Rundown: The Cloudy Role of FedRAMP
On Wednesday July 17th, I had the distinct honor of providing the assessor perspective at a FedRAMP hearing held by the Subcommittee on Government Operations—a subset of the House Oversight Committee.
-
Is It Time for Your Organization to Form an AI Ethics Committee?
Do you need to set up an artificial intelligence ethics committee if you are using this technology? Google certainly thought it did — until it changed its mind. Of course Google is one...
-
7 Cloud Myths Debunked
Don't let misconceptions cast a shadow over your organization's ability to get the most out of the cloud. Here are 7 cloud myths that should be relegated to history. Myths can be fun...
-
6 Hot IT Leadership Trends — and 6 Going Cold
As the CIO role becomes increasingly strategic, risk aversion and a results-oriented mindset take a backseat to increasingly influence and driving organizational change.
-
Cloudy With a Chance of Automation
Securing the cloud requires a different mindset than securing your on-prem infrastructure Adventures in securing the cloud As cloud operations become increasingly popular,...
-
Loading More...