C-SCRM – Cyber Supply Chain Risk Management 2022 In Person Dinner Meeting

August 17 @ 5:30 pm – 8:30 pm PDT

Our current supply chain is severely disrupted. Freight in the major ports of Los Angeles, Long Beach, and Oakland are backed up 100 miles out to sea.  The Biden administration issued an executive order in February of 2021 about Cyber Supply Chain Risk Management the same month NISTIR 8276 about C-SCRM was published.  Our supply chain is already shattered, and a cyber-attack could be the straw that breaks the camel’s back.  We will show you how to evaluate all your supply chain risk using the NIST Cybersecurity Framework and Capability Maturity Model (CMMI).  The keys to a successful C-SCRM program are cloud deployment combined with these proven frameworks.  We will show you how we use open-source data, the Salesforce secure cloud, and portals, to automate and deploy an effective C-SCRM program anywhere in the world.

Register Now

CISO Handbook: Securing Identity in a Zero Trust Environment

August 2, 2022

2:00 PM Webinar

During this exclusive CISO Handbook webinar, moderator Justin Doubleday and guest Angelica Phaneuf, chief information security officer at Army Software Factory will break down Army’s digital transformation initiatives in relation to their identity and security strategies. In addition, Matt Tarr, solutions architect at CyberArk, will provide an industry perspective.

For More: https://federalnewsnetwork.com/cme-event/federal-insights/ciso-handbook-securing-identity-in-a-zero-trust-environment/

Secure Development for Federal Software Supply Chains

July 27, 2022

2:00 pm – 3:00 pm

Description
How are agencies developing strategies to implement cutting edge software?

During this exclusive webinar, we will break down different approaches taken in securing software during development and production. Moderator Jason Miller and agency leaders will discuss some of the most important factors when you are deciding to bring new software into your ecosystem and how to ensure that your workforce has the necessary skills.

Learning objectives:

– Current State of Software Development in Agencies
– Cybersecurity Considerations for Open Source Software
– Decisions Around Building vs. Buying Capabilities

Register

Business Systems: DOD Needs to Improve Performance Reporting and Cybersecurity and Supply Chain Planning

The Department of Defense requested about $38.6 billion for FY 2022 for its unclassified information technology, such as communications systems and business systems.

We reviewed the performance of DOD’s 25 major IT business programs, management of cybersecurity and supply chain risks, and more. Among other things, we found:

  • 19 of the 25 programs did not fully report data measuring progress on system performance
  • Programs reported progress on only 77 of 172 performance targets
  • 15 of the 25 reported having an approved cybersecurity strategy and provided a copy to validate

Full Article

Space Force wants a ‘bloodhound’ to sniff out cyberthreats

U.S. Space Force has kicked off development of a seven-year contract for cybersecurity services to protect the ground networks that manage its space assets.

Space Force’s cyber operations division has dubbed the contract Digital Bloodhound and it will be a multiple-award, task-order contract. The solicitation is expected before the end of the year with an award by the end of March 2023.

The cyber operations division currently has two product lines for defensive requirements for cybersecurity and national security called Manticore and Kraken, according to the Sam.gov posting.

Full Article

GAO Pushes EPA to Implement Cyber Risk Assessment Framework

To better manage and protect against cybersecurity risks the Environmental Protection Agency (EPA) must establish an enterprise-wide cybersecurity risk assessment framework, the Government Accountability Office (GAO) said in its latest annual priority recommendations report to the agency.

GAO outlined 12 priority recommendations for EPA that fall into six focus areas – including ensuring cybersecurity at EPA.

Federal agencies continue to face a growing number of cyber threats to their systems and data. According to Federal guidelines, agencies need to effectively identify, prioritize, and manage their cyber risks to protect themselves against these threats.

Full Article

NCCoE Releases Draft Project Description for DevSecOps

The National Cybersecurity Center of Excellence (NCCoE) has released a new draft project description, Software Supply Chain and DevOps Security Practices: Implementing a Risk-Based Approach to DevSecOps. Publication of this project description begins a process to solicit public comments for the project requirements, scope, and hardware and software components for use in a laboratory environment.

Full Article

WEBINAR – CISO Handbook: Managing Supply Chain Risk at Scale

Learn how agencies are managing supply chain obstacles in this webinar on Thursday, July 14, 2022 at 2 p.m. ET.

During this exclusive CISO Handbook webinar, moderator Justin Doubleday will explore some of the challenges and best practices associated with supply chain security with Gerald Caron, the chief information officer at the Department of Homeland Security’s Office of the Inspector General. Additionally, Kelly White, the co-founder and president of RiskRecon, a Mastercard Company will provide an industry perspective.

Learning objectives:
• Supply Chain Security Best Practices
• The Zero Trust Approach

Register Now

80% of Firms Suffered Identity-Related Breaches in Last 12 Months

Rapidly growing employee identities, third-party partners, and machine nodes have companies scrambling to secure credential information, software secrets, and cloud identities, according to researchers.

In a survey of IT and identity professionals released Wednesday from Dimensional Research, almost every organization — 98% — experiences rapid growth in the number of identities that have to be managed, with that growth driven by expanding cloud usage, more third-party partners, and machine identities. Furthermore, businesses are also seeing an increase in breaches because of this, with 84% of firms suffering an identity-related breach in the past 12 months, compared with 79% in a previous study covering two years.

Source: https://www.darkreading.com/operations/identity-related-breaches-last-12-months

Europol Busts Phishing Gang Responsible for Millions in Losses

Europol on Tuesday announced the dismantling of an organized crime group that dabbled in phishing, fraud, scams, and money laundering activities.

The cross-border operation, which involved law enforcement authorities from Belgium and the Netherlands, saw the arrests of nine individuals in the Dutch nation.

The suspects are men between the ages of 25 and 36 from Amsterdam, Almere, Rotterdam, and Spijkenisse and a 25-year-old woman from Deventer, according to a statement from the National Police Force.

Source: https://thehackernews.com/2022/06/europol-busts-phishing-gang-responsible.html