Ready to get compliant?

Show Me How
Talk To Us




Most Popular

Audit & Accountability (1)
NIST SP 800-171 Requirement 3.3: Audit & Accountability 

NeQter's Pick

All Posts

As the CEO of Scientific Solutions, Inc. (SSI), a small, highly specialized engineering firm in the defense ecosystem, I work with a team of eight of the best and the brightest engineers. We develop sophisticated SONAR solutions that protect critical assets.
Happy Monday, Everyone! Some cybersecurity news is coming out of California this week... First IoT Cybersecurity Law Passed California has just become the first state to pass a cybersecurity law that covers smart devices. Beginning on January 1st, 2020, all devices manufactured in California that connect to the internet must be equipped with reasonable security features that will “prevent the unlawful access, alteration, or information disclosure.”
By now, most companies know about GDPR and its directives on handling personal data -- from email addresses to personnel data. But the connections between NIST cyber security compliance and GRPR compliance is far less obvious.
If you’ve heard of NIST SP 800-171, or operate within the Department of Defense ecosystem, you’re probably familiar with the term CUI, or Controlled Unclassified Information. Often used interchangeably with Covered Defense Information (CDI), CUI is, technically, “information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies but is not classified.”
On Friday, September 21st, the Trump Administration released a new cyber security strategy. According to Cyber Defense Magazine, it is the “first fully articulated National Cyber Strategy released in 15 years.” The President’s National Cyber Strategy is said to protect our networks by “securing Federal networks and information about our Nation’s critical infrastructure, as well as combating cybercrime and improving incident reporting.” As President Trump said, “We must protect the American people, the homeland, and our great American way of life.” It is great to know that we are taking a step forward in protecting our fast-growing cyber world.
What is a risk assessment, in the context of NIST cybersecurity compliance? What does it entail? When should we conduct the risk assessment? Who can do it for us, or can we do it ourselves?
Good morning and happy Monday! There is some interesting cyber news that I want to share with you today, but first, let’s discuss upcoming events. This Thursday, September 13th.
PBN: What are some of the specialized DoD subcontractors that can benefit from the NeQter Labs Compliance Engine?
Talk To Us