Press | In the News | Blog
TalaTek Informational Series
Learn more about TalaTek and the opportunities and issues facing our industry.
TalaTek adds Licensed Penetration Tester Certification
On January 15, 2014, TalaTek’s Senior Information Assurance Consultant, Joshua Grove, was awarded the credential of Licensed Penetration Tester (LPT) from EC-Council. EC-Council’s LPT program provides those seeking the accreditation the opportunity to practice their skills so that they are fully able to function as a licensed penetration tester.
TalaTek attends “P0WNAG3” Cyber Security Summit: “Threat Intelligence Analysis Techniques and Capabilities.”
On November 6, 2013, TalaTek attended the all-day “P0WNAG3”Cyber Security Summit in Greenbelt, MD, presented by TrainAce. The summit title was “Threat Intelligence Analysis Techniques and Capabilities” and its focus was threat intelligence and mobile application hacking.
MACHA Training – Mitigating Risks at Financial Institutions
On April 4, 2013, TalaTek attended the MACHA (Mid-Atlantic Clearing House Association) training on Account Takeover and Cyber Crime.
The full-day program was designed to assist financial institutions in mitigating their risks from account takeovers.
FISMA Reform Unanimously Passes House
It’s official: on April 16, 2013, the House of Representatives unanimously approved a bill making the first significant reforms in 11 years to the way the federal government governs information security.
The Federal Information Security Amendments Act of 2013 (H.R. 1163) updates the Federal Information Security Management Act of 2002. The House also overwhelmingly approved the Cyber-security Enhancement Act, created to advance cyber-security research and development, and expand and train a cyber-security workforce.
Attracting Female Talent in Technology
TalaTek examines the gender gap in tech and offers five steps to promote tech to more women to help level the playing field.
Avoid Cybersecurity Silos when Developing a Risk Management Program
TalaTek examines why a proactive holistic risk management strategy helps avoid cybersecurity silos and is more effective for organizations and offers seven steps to take to become more secure.
What Third-Party Risk Management Is and How to Get Started
Learn more about third-party risk management and what to expect when working with a third-party risk management firm.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Are You Using These Best Practices to Build a Vendor Risk Management Program?
Today’s IT playing field implores a higher state of alertness, not only within your enterprise but also outside of it. However, when it comes security, not all vendors are created equal. Some very likely have inferior security hygiene and practices that can affect you big time
Are You Using These Best Practices to Build a Vendor Risk Management Program?
Today’s IT playing field implores a higher state of alertness, not only within your enterprise but also outside of it. However, when it comes security, not all vendors are created equal. Some very likely have inferior security hygiene and practices that can affect you big time
TalaTek Announces Merger Agreement with CISO Global
TalaTek, an integrated risk management firm, announced a definitive merger agreement with CISO Global Corporation, a cybersecurity consulting and managed services company. Under the terms of the transaction, TalaTek is now a wholly-owned subsidiary of CISO Global and will continue to focus on providing …
TalaTek Areas Expertise

Compliance
View Posts »

FedRAMP
View Posts »

Risk Management
View Posts »

Cybersecurity
View Posts »


