Welcome to “Cyber Compliance and Beyond,” a Kratos podcast that will bring clarity to compliance, helping put you in control of cybersecurity compliance in your organization. Kratos is a leading cybersecurity compliance advisory and assessment organization, providing services to both government and commercial clients across varying sectors including defense, space, satellite, financial services, and health care. Through "Cyber Compliance and Beyond," our cyber team of experts will share thei ...
…
continue reading
1
7 - AI and Cyber Compliance
45:36
45:36
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
45:36
AI is bringing speed and velocity never seen before. Some studies show that the output is the equivalent to what 35-40 humans can produce. This speed and velocity is applied to countless use cases across just about every economic sector. Cybersecurity compliance is laden with repetitive, redundant, and time-consuming manual tasks. While humans brin…
…
continue reading
1
6 - Supply Chain Security
39:54
39:54
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
39:54
Supply chain security is not new, though it certainly feels as though it is. Thanks to globalization, supply chains are ever growing in their depth, complexity, and interconnectedness. Unfortunately, like so many other systems, security of supply chains hasn’t been at the top of the list of things to consider when evaluating supply chains. Understa…
…
continue reading
1
5 - The Market for Lemons
42:06
42:06
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
42:06
IT support is tricky for most businesses, especially for those not in the IT business. Thus, IT is a cost of doing business and a high cost at that. High costs drive down profits. Less profit makes it harder for businesses to invest in the products or services that they’re making and selling. Retaining IT staff is even more difficult. This is due t…
…
continue reading
1
4 - Vulnerability Management
52:18
52:18
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
52:18
Vulnerabilities are everywhere and on every IT asset within an organization. This makes vulnerability management one of the most important – if not the most important – risk mitigation activities an organization undertakes. But, the complexities inherent in many organizations combined with the sheer number of vulnerabilities leaves many not knowing…
…
continue reading
1
3 - Export Compliance Overlap
38:10
38:10
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
38:10
The number of compliance frameworks is seemingly endless. The lack of standards is problematic enough. Even more problematic, however, is how the compliance frameworks overlaps with one another. When it comes to International Trade and Export Compliance, the problem is overlap is accentuated by the fact that there is not a definitive ‘framework’ fo…
…
continue reading
1
2 - Encryption, FIPS 140, and Compliance
39:52
39:52
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
39:52
Some recent estimates have postulated that data is now the world’s most valuable asset. Unlike other assets, like oil, for example, data proliferates on a staggering scale. In other words, it doesn’t seem to be finite, subject the law of scarcity. This hammers home the importance of answering the question that each of you are wrestling with: how do…
…
continue reading
1
1 - FedRAMP Exception Cases
47:00
47:00
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
47:00
One of the greatest challenges to security compliance are exception cases. What are exception cases? They are the cases in which a particular compliance objective cannot be achieved, as required. The reasons are myriad: cost, environmental constraints, vendor dependency, and technical limitations. Building an exception case is key to achieving comp…
…
continue reading