top of page

Security

Trending Topics 

Trending Topics
Workshop of 4 to 6 people sitting at a table listening to a woman speaker

Security Vision and Trends Review

Developing an effective IT & Cyber Security strategy is challenging.  Staying abreast of the current risks, tools, and mitigation techniques is even more difficult. Security risks are constantly evolving and changing.  Costs related to a security breach have a much larger impact than most organizations realize.  

 

Data Perceptions’ Security Team lives in this IT security ecosystem.  Our industry experts will lead a collaborative discussion with your key security stakeholders to review your current vision for IT security and help you understand the impact of industry trends and directions.

Workshop of 5 - 6 members sitting around a table discussing their IT & Cyber Security Strategy
Security Scorecard Process Diagram vInte

This workshop-based review provides a forum to discuss development of a security vision and strategy with respect to current cyber security trends. It covers a broad spectrum of current cyber security industry trends and helps identify what is most relevant to your organization.

 

This is a relatively short engagement compared to a full security assessment. It is focused on high level discussions of the most important aspects of cyber security needed for improving your security posture. â€‹

 

This review provides a summary of relevant security trends and collaborative recommendations for potential roadmap items.

Level 1

Level 2

Level 3

Level 4

Cybersecurity Maturity Model Certification (CMMC)

The United States Department of Defense is requiring its suppliers and related supply chain to be compliant with the Cybersecurity Maturity Model Certification (CMMC).  The level of service or product that you are supplying, will determine the required level of certification, ranging from Level 1 and working your way up to Level 5, for higher risk solutions.

Data Perceptions can assess your organizations’ current cybersecurity maturity and provide a cybersecurity and operations roadmap to becoming compliant with the appropriate level of CMMC maturity.

This can be challenging but the criteria for CMMC compliance are based on good practices and have a lot of overlap with other cybersecurity frameworks like ISO 27001, CIS, and NIST.

Performed

17 Practices          0 Processes

- select practices are documented where required

Documented

72 Practices          2 Processes

- Each practice is documented, including Level 1 practices

- A policy exists that includes all activities

Managed

130 Practices          3 Processes

- Each practice is documented including lower levels

- A policy exists that includes all activities

- A plan exists, is maintained, and resources that includes all activities

Reviewed

156 Practices          4 Processes

- Each practice is documented including lower levels

- A policy exists that includes all activities

- A plan exists that includes all activities

- Activities are reviewed and measured for effectiveness (results of the review are shared with higher-level management. 

Level 5

Optimizing

171 Practices          5 Processes

- Each practice is documented including lower levels

- A policy exists that includes all activities

- A plan exists that includes all activities

- Activities are reviewed and measured for effectiveness

- there is a standardized documented approach across all applicable organizational units

CMMC
Contact Us
Recent Securty Articles

Recent Security Related Articles

  • White Facebook Icon
  • White LinkedIn Icon
  • White Twitter Icon
bottom of page