Press | In the News | Blog
TalaTek Informational Series
Learn more about TalaTek and the opportunities and issues facing our industry.
The Impact of the NIST SP 800-64r2 Withdrawal on the System Development Life Cycle
TalaTek client Chris Fillebrown, lead systems engineer for the Human Genome Sequencing Center, Baylor College of Medicine, examines why NIST withdrew NIST Special Publication 800-64r-2 and adopted NIST SP 800-160v1 in its place. looks at the upside of remote work for employees and employers alike.
Keeping Remote Workers Safe and Happy
TalaTek looks at the upside of remote work for employees and employers alike.
Employee Cyber Threat Training is Critical to a Firm’s Long Term Success
TalaTek delves into the need for cybersecurity training for employees and offers six best practices to keep employees safe online.
Effective Security Measures Can Stymie Cyber Attacks
As cyberwarfare continues to increase, effective security measures can help protect organizations when they begin with a risk management program. This article provides tips on getting started.
Five Ways to Integrate DEI into Virtual Workplace Practices
Learn diversity, equity, and inclusion (DEI) best practices when working remotely with these tips from TalaTek, an integrated risk management firm, that exclusively embraces a remote workforce.
Cyber Warfare is Now a Daily Threat in 2021
Recent state-sponsored cyberattacks prove that cyber espionage campaigns are targeting the public and private sectors with increasing sophistication and scale. Learn what you can do.
How to Work with the C-Suite to Ensure Proper Cybersecurity Resourcing
Learn best practices for working with the C-suite for proper cybersecurity budget and resourcing needs. – As the United States (and the world) experiences rising costs in food, gas, and housing; the stock market remains volatile; and major banks such as Citigroup raise global recession concerns, companies are watching their balance sheets closely. At the same time, organizations face the potential of new state-sponsored …
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Women know Cyber
The trailblazing women featured in this book represent the best of what our collective action against cybercrime can be. They have committed themselves to the mission of keeping our country safe from those who would do us harm and are on the front lines every day fighting everything from extortion and theft to espionage and data manipulation …
Stakeholder Management: Push or Pull?
Managing IT projects can be a bit art and a bit science. Learn how to move projects along by building trust through helpful insights from Ken Russman of TalaTek.
Stakeholder Management: Push or Pull? (Or Is it More About Building Trust?)
Managing projects for the best possible outcome is a bit art and a bit science. From a high-level view, stakeholder management includes: identifying the people that could impact a project, understanding the expectations of the stakeholders and their impact on a project, and developing strategies for effectively engaging the decision-making project stakeholders …
How businesses can view the Pentagon’s new cybersecurity standards
CMMC has become one of the looming issues for defense contractors as the Pentagon looks to fortify, not only its own networks, but those of the defense industrial base. In this op-ed, Johann Dettweiler, director of operations at TalaTek, a risk management firm, offers a frequently asked questions on how business leaders should think about this program.
Next generation controls for information systems and organizations now includes key focus on privacy
The National Institute of Standards and Technology (NIST) released its draft version of Revision 5 of Special Publication (SP) 800-53, Security and Privacy Controls for Information Systems and Organizations, in late March 2020 …
5 Strategies SMBs Should Follow to Strengthen Cybersecurity
Cybersecurity might seem like a huge challenge for a small and mid-sized business (SMB). But there are many strategies SMBs can implement quickly and relatively inexpensively to reduce cyber risks. In recognition of Cybersecurity Awareness month, Thomas Wolfe, head of strategic development for TalaTek outlines five key tactics …
Trust Ourselves and be Courageous by Baan Alsinawi
Managing Director at Ciso Global, Chief Compliance Officer and the President of TalaTek, Baan Alsinawi shares her cybersecurity journey from a teenager who wanted to understand computers and held several positions in IT from help desk to systems engineering and cybersecurity. Founding her own business focusing on compliance, Baan says she spends maybe only 20% of her day on technical tasks and that there is always so more to do. Finding the right …
TalaTek Areas Expertise

Compliance
View Posts »

FedRAMP
View Posts »

Risk Management
View Posts »

Cybersecurity
View Posts »


