At 5:00 PM all were invited to come out to Fayetteville Tech Community College to enjoy Subway catering and network with other professionals. During that time, all were directed to sign in at the front desk and receive their name badge.
From 6:00 PM – 7:00 PM our very own chapter Secretary , Nia Luckey, led us in a discussion, entitled Compliance Toolbox. Topics included:
- RISK MANAGEMENT FRAMEWORK (RMF)
- The RMF process:
- The RMF process:
- SECURITY TECHNICAL IMPLEMENTATION GUIDES (STIGs)
- How to leverage the IASE website to view information on all 436 current STIGs
- The STIG process including:
- ASSURED COMPLIANCE ASSESSMENT SOLUTION (ACAS)
- SECURITY CONTENT AUTOMATION PROTOCOL (SCAP)
- Automation for the STIG procedures
- ENTERPRISE MISSION ASSURANCE SUPPORT SERVICES (eMASS)
- All things Compliance documenting
Our senior cyber professionals led us in small group discussions covering:
- The latest trends in the cyber realm
- The “rebirth” of the WannaCry virus at Boeing (Check out the article)
- Microsoft’s anti-patch – The patch that actually makes your system less secure (Check out the article)
- Upcoming conferences and events.
- Real world experience from leaders from U.S Army Forces Command, Cisco, AT&T Consulting, and many more!
In closing, the term “Compliance” can be a daunting word. Pictures of mountains of paperwork, late night check the boxes, and redundant processes may rush to your head when you hear someone talk about it. However, Compliance is one of the most important issues that needs to be addressed in any company. Having a solid framework, toolset, and expertise when it comes to compliance in the workplace has never been so in-demand as it is today.
Check out the slide deck from the class here-Compliance-1 (1) (1)
I am convinced that there are only two types of companies: those that have been hacked and those that will be. – Robert Mueller