Data Security, Enterprise Security, Software Security

Zero Trust Maturity Model

April 28, 2023

Zero Trust Maturity Model
The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Spotlight

Fishtech Group

Fishtech is a data-driven cybersecurity solutions provider for any computing platform. Started in 2016 by Gary Fish, Fishtech was built to address a huge gap in cybersecurity between traditional on-premise solutions and the cloud. Focused on advisory, technology, and operations, we are Cloud-era security experts navigating our customers through secure digital transformation. Our advisory approach emphasizes consulting from an educated and experienced perspective.

OTHER WHITEPAPERS
news image

Leading Cybersecurity in Higher Education

whitePaper | February 11, 2023

Higher-education institutions are experiencing a high volume of cyberattacks and greater vulnerability to threats. Today’s educational technology environments connect a variety of endpoints—laptops, desktops, student management data, and email servers. They use Internet-of-Things (IoT) devices for managing environmental controls, security cameras, and door alarms. Both ends of the education spectrum gather, store, and use personal data from students and staff—and if they collect it, they must also protect it. As a result, schools need dedicated, skilled, and experienced executive leadership that is empowered, resourced, and responsible for campuswide cybersecurity issues.

Read More
news image

Dell VxRail: Comprehensive Security by Design

whitePaper | September 29, 2022

In today’s world, business organizations and individuals have become accustomed to accessing the information they need 24 hours a day, seven days a week, often within seconds of making a request. To illustrate, an ad marketing study conducted by Google found that 53% of website sessions are terminated if pages take longer than three seconds to load.

Read More
news image

Identity and Zero Trust: A Health-ISAC Guide for CISOS

whitePaper | August 25, 2022

These days, you can’t have a conversation about cybersecurity without talking about zero trust. The security concept requires that all individuals and devices on a network be continuously authenticated, authorized, and monitored. Gone are the days of letting someone in the front door, giving them a role with access privileges and then having them go about their merry way.

Read More
news image

Dell PowerScale OneFS: Security Considerations

whitePaper | December 28, 2022

In the age of Digital Transformation, organizations must adapt to modern data requirements and implement new features for the transformation life cycle. Throughout this process, protecting data is vital as it is an organization’s most valuable asset. This document describes how to maintain an aggressive security posture for a PowerScale OneFS cluster and meet industry security requirements.

Read More
news image

PROMOTING BETTER CYBERSECURITY

whitePaper | December 18, 2019

The Ohio Data Protection Act (“ODPA” or the Act), came into force on November 2, 2018.1 The Act seeks to improve cybersecurity among Ohio businesses. It does so by providing an affirmative defense against tort claims arising from a data breach to businesses that can demonstrate they have implemented a qualifying cybersecurity program that reasonably conforms to one of ten specified cybersecurity frameworks and met certain other safeguards specified in the Act.

Read More
news image

Best Practices for Row Level Security with Entitlements Tables

whitePaper | September 16, 2022

Row Level Security (RLS) in Tableau refers to restricting the rows of data a certain user can see in a given workbook or data source at the time they view the data. It contrasts with permissions within Tableau Server (or Tableau Online), which are used to control access to content and feature functionality.

Read More

Spotlight

Fishtech Group

Fishtech is a data-driven cybersecurity solutions provider for any computing platform. Started in 2016 by Gary Fish, Fishtech was built to address a huge gap in cybersecurity between traditional on-premise solutions and the cloud. Focused on advisory, technology, and operations, we are Cloud-era security experts navigating our customers through secure digital transformation. Our advisory approach emphasizes consulting from an educated and experienced perspective.

Events