At the Forefront: StateRAMP Advisory
WEBCAST:
StateRAMP is an effort to efficiently and effectively verify cybersecurity and third-party risk management for state and local governments. In this live training session, Senior Manager of Coalfire’s Cyber Risk Advisory, Jason Oksenhendler, provides an in-depth overview of StateRAMP compliance. Watch now to learn more.
Posted: 26 May 2023 | Premiered: May 26, 2023
|
|
FedRAMP Smarter, Faster, and with Maximized Results
WEBCAST:
In today’s turbulent threat landscape, compliance regulations mark an important gateway to potential business, ensuring your organization can demonstrate the trust required to maintain security. In this webcast ISMG curates a discussion in which experts explore The Federal Risk and Authorization Management Program (FedRAMP). Watch to learn more.
Posted: 25 May 2023 | Premiered: May 25, 2023
|
|
Leverage Cloud Services to Accelerate the CMMC Compliance Journey
WEBCAST:
The Cybersecurity Maturity Model Certification (CMMC) is a compliance standard used by the U.S. Department of Defense in order to verify potential contractors. In this webcast, ISMG’s Toby Morbin sits down with Coalfire’s Stuart Itkin and AWS’s Tom Wollard in order to discuss the CMMC compliance landscape. Read on to learn more.
Posted: 24 May 2023 | Premiered: May 24, 2023
|
|
Accelerate HITRUST Certification and Drive Security Goals
WEBCAST:
In this webcast, leaders from AWS, Coalfire and HITRUST provide a deep dive on HITRUST, discussing how businesses can accelerate their HITRUST certification and more. Watch now to unlock the insightful conversation.
Posted: 19 May 2023 | Premiered: May 19, 2023
|
|
The State of CISO Influence 2023
ANALYST REPORT:
CISOs and cybersecurity policy play a much more important role in business decisions than ever before. This is despite the fact that the majority of large and small companies spend less than $5 million annually on cybersecurity. Access the State of CISO Influence report here to learn about the state of security.
Posted: 01 Feb 2023 | Published: 02 Feb 2023
|
|
Common Risk Profiles for Software and Physical Supply Chains
WEBCAST:
Ensuring that your software supply chains are secure is one of the top security considerations your organization should prioritize. This webinar, Common Risk Profiles for Software and Physical Supply Chains, features cybersecurity experts as they shed light on how your business should protect your software supply chains. Tune in here.
Posted: 08 Nov 2022 | Premiered: Nov 8, 2022
|
|
The Impact of Penetration Testing on Organizational Cybersecurity Posture
WEBCAST:
There’s no way to know how your security will perform in the face of an attack, until it is attacked. This doesn’t mean you should wait on cybercriminals to know if your security is effective. This webcast presents an analysis of the effects of penetration testing, looking at how organizations are testing for vulnerabilities. Read on to learn more.
Posted: 08 Nov 2022 | Premiered: Nov 8, 2022
|
|
Preparing for PCI 4.0 – big changes you need to know now
WHITE PAPER:
One of the most impactful assurance programs – affecting most businesses, consumers, and supply chains – is the Payments Card Industry Data Security Standard (PCI DSS) version 4.0. Luckily, this white paper will outline the most important changes to keep in mind for compliance planning and budgeting. Keep reading to learn more.
Posted: 04 Nov 2022 | Published: 05 Nov 2022
|
|
5 ways to simplify and get DevSecOps right for development, operations, and security teams
WHITE PAPER:
More than 70% of organizations have or plan to incorporate security into their DevOps processes according to ESG and Coalfire. The full embrace of DevSecOps is the future. This white paper explores how organizations are implementing security
Posted: 15 Oct 2022 | Published: 15 Oct 2022
|
|
4th Annual Penetration Risk Report
ANALYST REPORT:
As technology evolves, and cybercriminals update their methodology, it is vital that cybersecurity professionals stay up to date on the latest risks and threats. This report uses penetration testing data to analyze risk, looking at where cybercriminals are attacking in order to determine where the most relevant threats lie. Read on to learn more.
Posted: 23 Sep 2022 | Published: 23 Sep 2022
|
|
Sitting in cars with hackers
WHITE PAPER:
According to a recent study, the costs of cybercrime are 6,000 times greater than the collective net worth of the companies that strive to prevent it. This white paper analyzes the state of cybersecurity testing, and advocates for a more intensive approach that removes arbitrary limitations for more realistic testing. Read on to learn more.
Posted: 21 Sep 2022 | Published: 21 Sep 2022
|
|
Software Supply Chain Risk
ANALYST REPORT:
Due to cloud’s vulnerability, as well as evolving risk, securing the supply chain has never been more difficult. This report leverages data to analyze the growing importance of supply chain risk management programs and how they are capable of navigating the security vulnerabilities inherent to supply chains. Read on to learn more.
Posted: 20 Sep 2022 | Published: 20 Sep 2022
|
|
System and Organization Controls (SOC) reports: Understanding the differences
WHITE PAPER:
System and Organization Control (SOC) reports are valuable tools for organizations to help build trust in their security and controls posture. Access this guide to learn key differences among the 5 SOC reports offered by Coalfire to help you understand the purpose of each report type and how it benefits a particular audience.
Posted: 18 May 2022 | Published: 18 May 2022
|
|
Compliance Accelerator – HITRUST
WHITE PAPER:
As the global standard for safeguarding information, HITRUST delivers a scalable, prescriptive and certifiable framework that enables organizations to demonstrate information security and privacy assurances to a global audience. Read on to learn how you can apply the 3-phase methodology to get a step ahead of your competitors.
Posted: 18 May 2022 | Published: 18 May 2022
|
|
Effective CISO board presentations
WHITE PAPER:
The move to the digital enterprise with cybersecurity incidents have raised the interest of directors to hear directly from those in cybersecurity. Learn more about how to gain support with CISO presentations in this whitepaper.
Posted: 18 May 2022 | Published: 18 May 2022
|
|
HITRUST CSF® Certification FREQUENTLY ASKED QUESTIONS
WHITE PAPER:
The HITRUST Common Security Framework (CSF) was developed by IT and healthcare professionals to provide a framework for managing the security requirements inherent in the Health Insurance Portability and Accountability Act (HIPAA). Find more about some of the answers to the most common questions in this document.
Posted: 18 May 2022 | Published: 18 May 2022
|
|
FEDRAMP AGENCY ATO ROUTE: WHAT DOES SPONSORSHIP ENTAIL?
WHITE PAPER:
FedRAMP is a government-wide program that provides a standardized approach to conducting security assessments and granting authorizations. There are 3 main stakeholders: cloud service providers (CSPs), third-party assessment organizations (3PAOs), and government agencies. Read this white paper to learn about these roles and responsibilities.
Posted: 17 May 2022 | Published: 17 May 2022
|
|
A newly hired CISO’s priorities: The first 30, 60, 90 days
WHITE PAPER:
As a CISO, how can you establish early credibility and earn an enterprise-wide vote of confidence in your ability to make value-driven, impactful contributions to the enterprise’s business goals? Tap into this white paper to gain insights into priorities for CISOs during their first 90 days in office to help set the stage for a successful tenure.
Posted: 17 May 2022 | Published: 17 May 2022
|
|
A strategic approach to sustaining HIPAA compliance
WHITE PAPER:
Tap into this white paper to learn how you can efficiently manage your HIPAA program in a strategic fashion by assigning track leaders that are responsible for key elements of your HIPAA program.
Posted: 17 May 2022 | Published: 17 May 2022
|
|
FedRAMP: Top 10 most common questions from CSPs
WHITE PAPER:
For many cloud service providers (CSPs), pursuing FedRAMP authorization can be a daunting and complex endeavor. This white paper outlines how Coalfire aims to answering your toughest questions. Access now to learn the answers to 10 commonly asked questions from CSPs.
Posted: 17 May 2022 | Published: 17 May 2022
|
|
5 ways to efficiently manage hybrid cloud environments
WHITE PAPER:
According to a recent ESG survey, 47% of respondents stated that the most common challenge with securing cloud-native applications and infrastructure is maintaining consistency across data center and public cloud environments. Tap into this white paper to learn 5 ways you can simplify and efficiently manage your hybrid environments.
Posted: 12 May 2022 | Published: 13 May 2022
|
|
FedRAMP government enclaves – essential for cloud service providers
WHITE PAPER:
Federal agencies continue to aggressively procure and implement public cloud deployment models and require FedRAMP accreditation for CSPs – but it’s easier said than done. Tap into this white paper to learn key strategies in managing services and maintaining FedRAMP compliance.
Posted: 12 May 2022 | Published: 13 May 2022
|
|
Identify and Remediate Application Vulnerabilities with Coalfire ThreadFix
ESG:
60% of organizations currently develop and deploy production cloud-native applications, according to ESG research. Tap into this ESG report to learn how the ThreadFix Platform is designed to provide sophisticated content that can be communicated to the development and security teams.
Posted: 12 May 2022 | Published: 13 May 2022
|
|
Application Security Champions Report
RESEARCH CONTENT:
This application security champions report dives into how AppSec champion programs operate, what best practices are, and why you should consider adopting one for more consistent and secure software. Access it here.
Posted: 11 May 2022 | Published: 11 May 2022
|
|
It’s digital transformation time Do you know where your CISO is?
WHITE PAPER:
Tap into this white paper to learn the importance of having an executive leader that can manage the digital transformation and security transformation of your organization while maintaining business objectives.
Posted: 05 Feb 2022 | Published: 05 Feb 2022
|