-
Top 3-5 failing controls; what are they and why are they so difficult to implement?
-
Outcomes by business profile; from professional services to the manufacturing floor.
-
Top 3 characteristics of organization's who successfully achieve compliance.
WEBINAR
How Secure is the Defense Industrial Base Supply Chain?
Access our data of DoD contractors' cybersecurity posture and the concerning findings.[RECORDED] February 3, 2021 | Anytime | Your Desk! |
CyberSheath CEO
After completing and scoring hundreds of Prime and Sub-contractor assessments, CyberSheath is sharing our data to enable contractors to better navigate the road ahead. This data exposing trends and benchmarks across the DIB that help identify what low and high-scoring organizations have in common, variables that negatively affect most businesses, and characteristics of companies attaining compliance. Based on these findings, we can identify the most efficient ways to address compliance and determine standards and best practices essential to ensure future success.
During this Webinar, You'll Discover:
-
Average assessment score by:
- Company size
- Industry
Speakers:
CyberSheath CEO
Mr. Noonan is a respected cybersecurity expert having testified before the House Armed Services Committee (HASC) Subcommittee on Emerging Threats and Capabilities and served on the Council on Cyber Security expert panel to review and update the Critical Security Controls.
Prior to founding CyberSheath, Eric was the Global Chief Information Security Officer for BAE Systems plc, based in London. Concurrently Eric served as Vice President and General Manager of North American IT operations, overseeing engineering, architecture, and IT operations support for approximately 39,000 employees.
CyberSheath VP of Compliance
Mr. Lang has over ten years of experience in cybersecurity, business resilience, and information technology from various roles in industries such as defense, healthcare, and retail.
He has expertise in CMMC compliance, security program development and assessment, and has extensive experience in strategically planning security and business continuity programs based upon internationally recognized standards of practice from NIST, ISO, FISMA, and the PCI-SSC.