Author: ddv82kdsa
Grow IT Partners: Interview with Mike Battistella
Written by ddv82kdsa on . Posted in Podcasts.
With a career spanning over two decades, Mike has seen the evolution of IT and cybersecurity, constantly adapting and expanding his company’s capabilities. Under his guidance, Solutions³ has made significant strides in IT Operations Management and cybersecurity, offering comprehensive services from vulnerability assessments to policy writing.
CyberSaint Stronger Conference. Executive Orders Mandating the NIST Cybersecurity Framework
Written by ddv82kdsa on . Posted in Podcasts.
In this presentation, the presenters will provide an overview of the Executive Order (EO), its impact of and the long-term benefit the EO will have on government departments and agencies. It will also cover how the EO will change how government contractors will need to align with the needs and requirements that contracting officers will be expecting from their supply chain.
When the market screams cybersecurity
Written by ddv82kdsa on . Posted in Articles.
A strong cybersecurity strategy starts with a stable foundation—and that means aligning IT Operations Management (ITOM) with security efforts. In this article, we explore how a disconnect between ITOM and security teams leaves organizations vulnerable, and why collaboration is key to defending against modern cyber threats. Learn why MSPs and MSSPs must coordinate, not compete, to truly protect digital assets.
Cybersecurity Attacks & Their Disruptions
Written by ddv82kdsa on . Posted in Articles.
From SolarWinds to ransomware attacks on vital infrastructure, cybersecurity threats are growing more sophisticated and more frequent. This article outlines how small and midsized businesses can shift from reactive to proactive by embracing training, frameworks like NIST-CSF, and long-term action plans. Now is the time to build cyber resilience and weather the storm ahead.
CyberSaint Stronger Conference. Roadmap to Compliance – Various Approaches to Compliance
Written by ddv82kdsa on . Posted in Podcasts.
Many organizations are struggling with the NIST 800-171 compliance requirement and the ultimate goal of obtaining the Cybersecurity Maturity Model Certification. Mike will focus on DIB frameworks such as SP 800-171 and CMMC, the insights he shares can be applied agonistically across frameworks and standards.