by Andrew Lowe | Apr 28, 2014 | Risk Management
On April 11, 2014, Madeline Weeks, TalaTek’s Junior Information Assurance Consultant, passed the “Federal Information Technology Security Professional: Auditor (FITSP-A)” certification exam from the Federal Information Technology Security Institute (FITSI). The FITSP certifying exam is a role-based exam ranging from Auditor, Operator, Designer and Manager. It is consistent with NIST SP 800-16, Information Technology Security Training Requirements: A Role- and Performance-Based Model.
by Andrew Lowe | Nov 21, 2013 | Cybersecurity, Risk Management
On November 6, 2013, TalaTek attended the all-day “P0WNAG3”Cyber Security Summit in Greenbelt, MD, presented by TrainAce. The summit title was “Threat Intelligence Analysis Techniques and Capabilities” and its focus was threat intelligence and mobile application hacking.
by Andrew Lowe | May 2, 2013 | Cybersecurity, Risk Management
On April 4, 2013, TalaTek attended the MACHA (Mid-Atlantic Clearing House Association) training on Account Takeover and Cyber Crime.
The full-day program was designed to assist financial institutions in mitigating their risks from account takeovers.
by Andrew Lowe | Aug 2, 2011 | Compliance, News, Risk Management
By Mollie Jewell, CISSP TalaTek began delivering FISMA continuous monitoring risk management services to its clients in 2008. At that time, this was something very few paid much attention to, and for the most part compliance efforts ended by signing the certification...
by Andrew Lowe | Mar 24, 2011 | News, Risk Management
The Emerging IT Conference, presented by the National Capital Area Chapter of ISACA on March 15, 2011, showcased a variety of topics presented by speakers with extensive experience applying technology initiatives in the public and private sectors. Topics included...
by Andrew Lowe | Dec 1, 2010 | Compliance, News, Risk Management
In a Nov 30, 2010 Federal Computer Week story, it was announced that the White House has instructed federal agencies to immediately evaluate their security practices. The objective: to determine if they have adequate restrictions in place on employees’ access to...