19 Nov Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, InfoSec Strategies | Category - Pivot Point Security 95% of Board Members Say Information Security Strategy is Now Critical June 24, 2024 By Richard Barrus The Deloitte Insights report, “Reshaping the cybersecurity landscape,” indicates that financial firms have been steadily increasing sec... Continue reading
18 Nov Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, InfoSec Strategies | Category - Pivot Point Security Trusted Information and Its Role in Validating Your Information Security Program January 19, 2024 By Richard Barrus Before you can make information security a strategic enabler for your business, you need a way to prove to clients, regulators, investo... Continue reading
17 Nov Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, Cybersecurity Maturity Model Certification (CMMC) GCC High and Gap Assessments! January 18, 2024 By John Verry The following blog is guest post from Agile IT, a CMMC Registered Practitioner Organization (RPO) and provider of CMMC Compliant Micros... Continue reading
16 Nov Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, Cybersecurity Maturity Model Certification (CMMC) CMMC 2.0 and the False Claims Act—Be Careful What You Sign! January 18, 2024 By Richard Barrus Among the biggest changes in the US Department of Defense (DoD)’s recent announcements about CMMC 2.0 is the rollback of requirements f... Continue reading
15 Nov Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, Cybersecurity Maturity Model Certification (CMMC) CMMC 2.0: What’s New and What’s Not for Orgs Handling CUI? January 18, 2024 By Richard Barrus The US Department of Defense (DoD)’s move from CMMC 1.0 to CMMC 2.0 has thus far been seen in a positive light by industry leaders and ... Continue reading