Time Again for Cyburgh – and Additional Cyber Resources

As we have seen over the last month, cybersecurity and data privacy issues continue to dominate the headlines and be a top concern for organizations of all sizes and industries.

Just over the last few weeks, ransomware attacks prompted those in the southeast to panic buy and hoard gasoline after an attack on the Colonial Pipeline, and we learned of the release of thousands of sensitive Washington DC Metropolitan Police documents to the dark web, including gang informants, personnel records and background checks. While these are high-profile instances involving large institutions, the reality is that organizations of all sizes continue to be at risk every day.

With the conversation around cybersecurity concerns only increasing, the Schneider Downs cybersecurity team would like to extend an invitation to our networks to attend the 2021 Cyburgh Initiative virtual event for free with promo code SD21.

The annual event is hosted by the Pittsburgh Tech Council and brings together cybersecurity professionals from the western Pennsylvania region to discuss critical topics in the cybersecurity world. This event runs from Tuesday, May 25 to May 27, and will focus on how vulnerability impacts the bottom line, you can register at www.pghtech.org/events/2021Cyburgh_1.

Additionally, the event is hosting a panel discussion on the Cybersecurity Maturity Model Certification (CMMC) . The panel, Cybersecurity Maturity Model Certification – Navigating through the Murky Waters of Certification, will focus on the nuances and best practices of obtaining this certification, and lessons learned from those who have completed the process. Troy Fine, Senior Manager of Risk Advisory at Schneider Downs, who is qualified as a CMMC Provisional Assessor, will lend his expertise to the discussion and shared his thoughts on the panel:

“The panel is made up of industry experts playing different roles in the CMMC ecosystem and each panel member will bring a wealth of knowledge and insight to help attendees navigate CMMC compliance.  This is a great opportunity to learn about CMMC compliance and what to expect as you begin your CMMC journey.” ­

Introducing New Resources

To support the event and panel discussion, the Schneider Downs cybersecurity team has introduced a number of new resources to our robust cybersecurity resource library. The new pieces focus on cybersecurity strategy in 2021 and CMMC, and are available below. 

Top 10 Cybersecurity Strategy Mistakes of 2021 Whitepaper

Learn about the top ten cybersecurity strategy mistakes our team has encountered in 2021 and best practices to avoid these common pitfalls. 

Access the Whitepaper

CMMC Preparation Checklist

Be better prepared for your CMMC engagement using our preparation checklist. The checklist organizes critical steps organizations need to consider starting from 12 months out. 

Download the Checklist

CMMC FAQ Guide

As part of our continued commitment to helping organizations prepare for and understand CMMC, our team has curated some of the most frequently asked questions from authorized resources and professionals for quick reference. 

Download the FAQ

About Schneider Downs Cybersecurity

The Schneider Downs cybersecurity practice consists of experts offering a comprehensive set of information technology security services, including penetration testing, intrusion prevention/detection review, ransomware security, vulnerability assessments and a robust digital forensics and incident response team. For more information, visit www.schneiderdowns.com/cybersecurity or contact the team at [email protected].

In addition, our Digital Forensics and Incident Response teams are available 24x7x365 at 1-800-993-8937 if you suspect or are experiencing a network incident of any kind.

You’ve heard our thoughts… We’d like to hear yours

The Schneider Downs Our Thoughts On blog exists to create a dialogue on issues that are important to organizations and individuals. While we enjoy sharing our ideas and insights, we’re especially interested in what you may have to say. If you have a question or a comment about this article – or any article from the Our Thoughts On blog – we hope you’ll share it with us. After all, a dialogue is an exchange of ideas, and we’d like to hear from you. Email us at [email protected].

Material discussed is meant for informational purposes only, and it is not to be construed as investment, tax, or legal advice. Please note that individual situations can vary. Therefore, this information should be relied upon when coordinated with individual professional advice.

© 2024 Schneider Downs. All rights-reserved. All content on this site is property of Schneider Downs unless otherwise noted and should not be used without written permission.

our thoughts on
8 Key Considerations When Reviewing User Access
SOC 2 Terminology: Vendor vs Subservice Organization vs Subcontractor vs Third Party vs Nth Party
Did Poor Change Management Contribute to the AT&T Wireless and McDonald’s Outages?
Subservice Organizations: Their Role and Impact on Your SOC Report
Allegheny County Marriage License Data Leak May Affect Recent Newlyweds
PCI DSS v4.0 is Here…Are You Ready?
Register to receive our weekly newsletter with our most recent columns and insights.
Have a question? Ask us!

We’d love to hear from you. Drop us a note, and we’ll respond to you as quickly as possible.

Ask us
contact us
Pittsburgh

This site uses cookies to ensure that we give you the best user experience. Cookies assist in navigation, analyzing traffic and in our marketing efforts as described in our Privacy Policy.

×