Press | In the News | Blog
TalaTek Informational Series
Learn more about TalaTek and the opportunities and issues facing our industry.
Inaugural Internship Program Member Becomes Full-Time Team Member.
TalaTek’s inaugural Internship Program member becomes a full-time team member.
Brian Thiellen is the first Junior Information Assurance Consultant to join the TalaTek team after completing the TalaTek Information Security Continuous Monitoring (ISCM) Internship Program.
TalaTek adds another Certified Ethical Hacker to its team.
On August 23rd, Johann Dettweiler earned the “Certified Ethical Hacker” certification, offered by EC-Council. The certification is awarded to Information Security professionals who complete training in learning how to identify and defend against the latest cyber-criminal hacking threats.
TalaTek Announces Information Security Continuous Monitoring (ISCM) Internship Program
TalaTek is pleased to announce the launch of the inaugural Information Security Continuous Monitoring (ISCM) Internship Program, and is proud to welcome Brian Thiellen as the inaugural member of the TalaTek ISCM Internship Program.
The Internship Program provides entry-level information security personnel with a unique opportunity to gain valuable Information Assurance (IA) professional experience. This hands-on program is designed to mentor and cultivate upcoming IA professionals based on the TalaTek methodology.
Madeline Weeks adds “Federal Information Technology Security Professional: Auditor (FITSP-A)” certification.
On April 11, 2014, Madeline Weeks, TalaTek’s Junior Information Assurance Consultant, passed the “Federal Information Technology Security Professional: Auditor (FITSP-A)” certification exam from the Federal Information Technology Security Institute (FITSI). The FITSP certifying exam is a role-based exam ranging from Auditor, Operator, Designer and Manager. It is consistent with NIST SP 800-16, Information Technology Security Training Requirements: A Role- and Performance-Based Model.
Coming Soon: Department of Defense Cyber Security Maturity Model Certification Takes Aim at Protecting the Defense Supply Chain
TalaTek examines the new, impending Department of Defense unified certification standard, the Cybersecurity Maturity Model Certification, and what actions vendors should begin to take to prepare.
Making a Workplace Culture of Security a Priority
TalaTek recommends promoting a workplace culture of security and offers 5 steps for creating this environment.
How the Lack of a Strong Cybersecurity Strategy can Impact an Organization
Business leaders must always keep #cybersecurity a tier-one priority when planning. If overlooked, their firm can suffer irreparable damages. Here’s why.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Understanding The Implications Cyberwarfare Has On Your Cybersecurity Strategy
Here’s what businesses must do to stay ahead of threats, which can often be avoided with appropriate assessment, controls and monitoring
Are You Using These Best Practices to Build a Vendor Risk Management Program?
Vendor management is critical to the security of today’s networks. Learn more about best practices to build a vendor risk management program.
Policy Compliance: OneSize Does Not Fit All
How do we get our brains around the arcane topic of policy compliance? Security pros define compliance as adhering to established rules and regulations, codes of conduct, laws, or organizational standards of conduct. For the cybersecurity industry, this means following guidelines established
TalaTek Areas Expertise

Compliance
View Posts »

FedRAMP
View Posts »

Risk Management
View Posts »

Cybersecurity
View Posts »


