Category: Security Program Development

Learn the Basics of DFARS Clause 252.204-7012

Learn the Basics of DFARS Clause 252.204-7012

As a subcontractor on a Department of Defense contract, you have likely had flow down requirements from your primes related to DFARS clause 252.204-7012, commonly referred to as NIST 800-171. Many subcontractors, as they scramble to secure their infrastructure to be...
Security Tool Procurement: 3 Keys To Success

Security Tool Procurement: 3 Keys To Success

Security products, or tools, are an important part of the three legged stool of people, processes, and technology. My experience has been that the technology portion of the equation gets most of the attention and a large share of the budget. There are many reasons for...
How Two Multiplayer Games can Make Your Security Program Stronger

How Two Multiplayer Games can Make Your Security Program Stronger

Do a search for video games and information security and you will find countless comparisons to how these two seemingly disparate fields go hand-in-hand.  I really like this article from last summer, as it examined not just video games, but organized sports and their...

Security Means Managing What You Already Own First

A trend that I have picked up on in conversations with CIO’s, CISO’s and other leaders responsible for securing the enterprise is the huge gap between what they need and what many vendors are marketing. Security leaders in the trenches need solutions to optimize and...

How CyberSheath Adds Value…

I’ve spent the week here at RSA talking with current and future customers and a great question I get from customers looking for a trusted security partner is “So what exactly is it you do?” It seems like a simple question but what it usually implies is some level of...

Contact Cybersheath

By completing this form, I consent to receiving calls, texts and/or emails from Cybersheath regarding services and programs.