Press | In the News | Blog
TalaTek Informational Series
Learn more about TalaTek and the opportunities and issues facing our industry.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
MACHA Training – Mitigating Risks at Financial Institutions
On April 4, 2013, TalaTek attended the MACHA (Mid-Atlantic Clearing House Association) training on Account Takeover and Cyber Crime.
The full-day program was designed to assist financial institutions in mitigating their risks from account takeovers.
FISMA Reform Unanimously Passes House
It’s official: on April 16, 2013, the House of Representatives unanimously approved a bill making the first significant reforms in 11 years to the way the federal government governs information security.
The Federal Information Security Amendments Act of 2013 (H.R. 1163) updates the Federal Information Security Management Act of 2002. The House also overwhelmingly approved the Cyber-security Enhancement Act, created to advance cyber-security research and development, and expand and train a cyber-security workforce.
Avoid Cybersecurity Silos when Developing a Risk Management Program
TalaTek examines why a proactive holistic risk management strategy helps avoid cybersecurity silos and is more effective for organizations and offers seven steps to take to become more secure.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Are You Using These Best Practices to Build a Vendor Risk Management Program?
Today’s IT playing field implores a higher state of alertness, not only within your enterprise but also outside of it. However, when it comes security, not all vendors are created equal. Some very likely have inferior security hygiene and practices that can affect you big time
TalaTek Areas Expertise

Compliance
View Posts »

FedRAMP
View Posts »

Risk Management
View Posts »

Cybersecurity
View Posts »


