Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
FedRAMP, IT security, and the cloud
Monday - 7/8/2013, 6:47pm EDT
In other words, you are not the only one confused with a 457 page document on federal security.
Associations have sprouted up that have local chapters to help.
One well know group is the Information Systems Security Association, commonly known as the ISSA.
They are representing the Information Systems Security Association, Northern Virginia Chapter ... or I-S-S-A NOVA.
Grohmann and Dyson give an overview of how the federal government has evolved in its strategy to be more secure.
Initially, they had to do on inventory of systems to see what was in place.
Only after a system has been defined can you make the next step called continuous monitoring.
Both security professionals explain how one should approach NIST 800.53 rev 4 as well as giving suggestions on where to get more information.