Hybrid ISSO role in Baltimore MD Long Term RMF, A&A, ATO, $140K+ IAT 3 Cert, Secret Clearance, 15 years.
Matthew Kreider’s Post
More Relevant Posts
-
Numerous defense and civilian agencies grapple with outdated communication systems, posing obstacles to interacting with users in differing security domains. This leads to substantial expenses for maintenance and growth. At Owl we understand those difficulties and created a solution that enables secure, efficient voice & video collaboration. Watch our “Leveraging Advanced Voice & Video CDSs for Secure, Efficient Collaboration” webinar where we delve into the advantages of incorporating voice and video CDSs. Watch today! https://lnkd.in/eUAUDiCV #CrossDomainSolutions #DecisionAdvantage
To view or add a comment, sign in
-
Join us on October 13, at 10:00am where a panel of experts from CISA and the Department of Defense (DoD) will assess their recent publications’ similarities and unique features. Learn more about the future plans for both and the impact on Zero Trust implementations. → https://bit.ly/3ZVerJs
To view or add a comment, sign in
-
-
Patriot | CMMC Evangelist & Capacity Builder | Coup d'Oeil | DoD | IC | SOF | Veteran | Board Member | Digital Transformation | CUI | Cybersecurity | Technology | Compliance | Innovation
Restrict Access to CUI - MP.L2-3.8.2 Access must be restricted to CUI/FCI in any form including network resources that process, store, and transmit CUI to only those eligible, qualified, and authorized personnel or visitors within their scope of duties. DoD DCSA FAQ - HOW IS CUI MARKED? At a minimum, CUI markings for unclassified DOD documents will include the acronym “CUI” in the banner and footer of the document. Marking requirements apply to documents, emails and forms of media that are designated as CUI. Furthermore, marking labels are available for media such as USB sticks, hard drives, and CD ROMs to alert holders to the presence of CUI stored on the device in accordance with CUI Notice 2019-01. Protect Our Warfighters. Protect CUI. #CUI #cmmc #nist #DFARS #CUISupply #DTCGlobal #ReganEdens #CMMCWarRoom #cmmcconversations #CMMCMythbusters
To view or add a comment, sign in
-
-
The proposed CMMC 2.0 ruling is finally out, and there is a lot to unpack. So our #CMMC experts have extracted the highlights and how they affect the Defense Industrial Base. DoD contractors, this means you! 🔍 Insights Include: - New requirements for prime contractors and subcontractors. - Updates on Third Party Managed Services and Operational Technology -The role of the Joint Surveillance Voluntary Assessments 🔐 For OSAs: - Understand how changes affect Organizations Seeking Assessment. - The importance of Asset Categorization and compensating controls 🛡️Read the full briefing below. #CMMC #Compliance #DoD
To view or add a comment, sign in
-
When a US defense and technology manufacturing company learned that its systems had been compromised, it didn’t wait to act. The organization’s legal team reached out to Palo Alto Networks Unit 42 Incident Response team, requesting immediate help. Palo Alto Networks Unit 42 began the investigation immediately and quickly determined that the attacker was still inside the company’s systems. Unit 42 needed to help stop the attack and also gain visibility into the scope, impact, and timeline. The high-stakes engagement required real-time threat intelligence alongside forensic analysis and advanced analytics. To accelerate the process, Unit 42 enlisted multiple in-house expert teams, including the Unit 42 Threat Intelligence team, and deployed Palo Alto Networks CORTEX XDR to improve visibility, analyze data, block actions, and remediate based on real-time indicators being collected. Leveraging live response data and offline collection capabilities, Palo Alto Networks Unit 42 captured data from dozens of in-scope systems. They collected forensic images and performed threat-hunting queries through CORTEX XDR to obtain key details and data points. The Palo Alto Networks Unit 42 Incident Response and Managed Threat Hunting teams successfully identified the threat actor, contained the attack, evicted the threat actor, and identified opportunities for the client to strengthen its defenses.
When a US defense contractor's systems faced a breach via an APT attack, they joined forces with the elite Palo Alto Networks Unit 42 Incident Response. See how the team swiftly identified, contained, and evicted the threat actor. 🛡️ https://bit.ly/3QLmWSS
To view or add a comment, sign in
-
Working with the #DoD hasn’t always been easy, but several of us are looking to change that. The Department of Defense Office of Small Business Programs recently released the “10 Steps to Winning Your First DoD Contract,” and we think it’s worth a read! This document breaks down information on available resources and how your business can work with the DoD. Make sure you take a look! https://lnkd.in/eNWR4zAP
To view or add a comment, sign in
-
-
With CMMC 2.0, a new era of security standards has dawned for the defense industrial base. But the path to compliance is no simple endeavor, especially for DoD contractors, subcontractors, and sub-subcontractors. That's where a certified Registered Practitioner Organization (RPO) steps in as your ally, ensuring efficient and cost-effective compliance. 🔒 Elevate Security for Defense Contracts 🚀 Open New Avenues of Revenue 🛠️ Tailor Compliance to Your Scope Climbing the compliance ladder is a collaborative journey. Let's join forces to safeguard your mission and unlock unprecedented possibilities. #CMMC #DefenseCompliance
To view or add a comment, sign in
-
-
Founder/President, US-Asia Business Consulting Principal, Trusted Advisor, Chamber Executive, Global Connector
“As a small business owner interested in working with the U.S. Department of Defense (DoD), how do you transition from your current position to winning a coveted contract?" This is a simple yet good document to read. I believe the most important thing is understanding your readiness for government procurement.
Working with the #DoD hasn’t always been easy, but several of us are looking to change that. The Department of Defense Office of Small Business Programs recently released the “10 Steps to Winning Your First DoD Contract,” and we think it’s worth a read! This document breaks down information on available resources and how your business can work with the DoD. Make sure you take a look! https://lnkd.in/eNWR4zAP
To view or add a comment, sign in
-
-
Release of the Department of Defense Zero Trust Overlays https://wp.me/p9gxja-39x https://lnkd.in/dH_NqVwd Oipol & Oijust operating in U.S.A | U.S Department of Defense (DoD), communication and video, June 4, 2024 | 3:04 | Cooperation and edition Oipol & Oijust, June 5, 2024 - Les Call, director for the Department of Defense's Zero Trust Portfolio Management Office, discusses the June 4, 2024, release of the Department of Defense Zero Trust Overlays. The overlays are important because they are designed to accelerate implementation of zero trust within the department to better protect DOD networks.
To view or add a comment, sign in
-
-
SCIF: Sensitive Compartment information facilities (pronounce skif) Secure area which used for military or intelligent centers. You can discuss, analyze ,… about top secret subjects in this environment. It should be acoustic, especial locking for doors, without any windows. RFI(Radio Frequency Interruption should be installed. Wi-Fi, Bluetooth, voice/video recording is forbidden. #SCIF #security #cissp #cissptraining
To view or add a comment, sign in
-