18 Nov Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, InfoSec Strategies | Category - Pivot Point Security Trusted Information and Its Role in Validating Your Information Security Program January 19, 2024 By Richard Barrus Before you can make information security a strategic enabler for your business, you need a way to prove to clients, regulators, investo... Continue reading
17 Nov Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, Cybersecurity Maturity Model Certification (CMMC) GCC High and Gap Assessments! January 18, 2024 By John Verry The following blog is guest post from Agile IT, a CMMC Registered Practitioner Organization (RPO) and provider of CMMC Compliant Micros... Continue reading
16 Nov Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, Cybersecurity Maturity Model Certification (CMMC) CMMC 2.0 and the False Claims Act—Be Careful What You Sign! January 18, 2024 By Richard Barrus Among the biggest changes in the US Department of Defense (DoD)’s recent announcements about CMMC 2.0 is the rollback of requirements f... Continue reading
15 Nov Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, Cybersecurity Maturity Model Certification (CMMC) CMMC 2.0: What’s New and What’s Not for Orgs Handling CUI? January 18, 2024 By Richard Barrus The US Department of Defense (DoD)’s move from CMMC 1.0 to CMMC 2.0 has thus far been seen in a positive light by industry leaders and ... Continue reading
12 Nov Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, Cybersecurity Maturity Model Certification (CMMC) CMMC 2.0: What’s New and What’s Not at “Level 1” (FCI Only)? January 18, 2024 By Richard Barrus The shift from CMMC 1.0 to CMMC 2.0 based on the US Department of Defense (DoD)’s review of the program has garnered a lot of attention... Continue reading