Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CMMC Town Hall With Bill Walter, DHG & Eric Crusius, Holland & Knight | 3/2/22 | NeoSystems

NeoSystems CMMC Town Hall Series: Join NeoSystems’ Chief Information Security Officer, Ed Bassett, for our weekly CMMC Town Hall designed for the Defense Industrial Base and GovCon community. Each session features special guests and offers an opportunity for attendees to ask questions regarding CMMC and cybersecurity. Topics covered include CMMC compliance requirements, how to prepare for CMMC certification, and the latest updates from the CMMC AB.

The Centripetal CleanINTERNET Service

CleanINTERNET is an innovative, nextgen threat intelligence service for overstretched and outmanned SecOps teams who need a better way to help prevent known attacks, evolving attacks, and zero-day threats. Unlike existing security defenses, like nextgen firewalls, traditional threat intelligence, and IDS/IPS tools that are too reactive, require expensive threat hunting skills, and force organizations to choose between full security and network performance.

Plymouth, Inc Recovers in 48 Hours and Zero Data Lost From Security Breach

"The reality is, no business is immune from ransomware. It’s more important than ever to proactively prepare for a cyberattack and ensure you have the right data security solutions in place to quickly recover after an attack, while also minimizing the chance of re-infection. With Rubrik’s latest product release, they continue to make critical advancements to their ransomware recovery solutions to give customers the ultimate peace of mind.” – Rama Arumugam, IT Manager, Plymouth, Inc.

Robustness vs Resilience in Cybersecurity

Our cybersecurity architectures need to be resilient, not robust. Let’s understand with an example: Egyptian pyramids are robust. They have stood the test of time for 1000s of years. But they're not resilient. If you blow one up with dynamite, it will explode. On the other hand, a coral reef is resilient. If you break off a part of it, it regenerates itself. Similarly, in cybersecurity, we need to have the mindset of resilience, recovery, and recuperation.