IT Blog

  • IT Dojo Announces Security Control Assessment (SCA) Training Workshop

    Training Overview Security Controls Assessment Workshop provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today’s IT systems. This course shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and […]

  • Is RMF Broken? Can it be fixed or is it beyond repair?

    By Lon J. Berman CISSP, RDRP Thanks to the work of the Joint Task Force, RMF is now the official information security life cycle process across all three “segments” of the Executive Branch, i.e., DoD, federal civil agencies, and the intelligence community. It’s now been 4 ½ years since DoD officially “adopted” RMF (DoDI 8510.01, […]

  • The Newest NIST Framework: The NIST Privacy Framework

    By Kathryn Daily, CISSP, CAP, RDRP NIST has announced the development of a Privacy Framework. The framework is needed to ensure the ability to design, operate, or use technologies in ways that are observant of various privacy needs in a progressively connected and complicated environment. It is expected to help manage risk by protecting people’s […]

  • STIG 101 Training Dates ADDED!

    We’ve had a huge response to our STIG 101 training!  New dates have been added.  If you are interested, please reach out to us soon! August 24, 2018  Live Remote Online August 31, 2018  Live Remote Online September 28, 2018  Live Remote Online October 19, 2018  Live Remote Online October 26, 2018  Live Remote Online November 14, 2018  Live […]

  • RMF Training

    Upcoming RMF for DoD IT Training Schedule

    New training dates for our RMF for DoD IT training course have been released!  If you are interested in pricing or availability in the course at any of the locations (or online), please be sure to reach out to Contact Nick Webb with Questions or to Enroll! 757-216-3656 (nick@itdojo.com). Upcoming Dates: August 20 – 23  Live Remote Online August 27 – 30  […]

  • NIST 800-37 Rev. 2

    By Lon J. Berman CISSP, RDRP The National Institute of Standards and Technology (NIST) is in the process of preparing Special Publication (SP) 800-37 Rev 2 for publication. As you may know, NIST SP 800-37 is the publication that defines the Risk Management Framework (RMF) roles, responsibilities and life cycle process. A review of the […]

  • NIST 800-171: Confusion and the Protest Docket

    By Kathryn Daily, CISSP, RDRP I’m sure by now you’ve at least familiarized yourself with NIST 800- 171, “Protecting Unclassified Information in Nonfederal Information Systems and Organizations.” What wasn’t made clear was how DoD will evaluate a contractor’s System Security Plan (SSP). In May, DoD released draft DoD Guidance for Reviewing System Security Plans and […]

  • RMF Applied to Modern Vehicles

    By P. Devon Schall, CISSP, RDRP During a recent RMF literature search, I came across an interesting article titled “RMF Applied to Modern Vehicles”. The article was published by Charlie McCarthy and Kevin Harnett in 2014 and sponsored by the National Highway Traffic Safety Administration (NHTSA). The overall goal of the research was to collect […]

  • IT Dojo Introduces: STIG 101 Training

    By Kathryn Daily, CISSP, RDRP NIST 800-53, and specifically Security Control CM-6, requires an organization to a. Establish and document configuration settings for information technology products employed within the information system using [Assignment: organizationdefined security configuration checklists] that reflect the most restrictive mode consistent with operational requirements; b. Implement the configuration settings; c. Identify, document, […]

  • RMF and the Defense Security Service (DSS)

    By Lon J. Berman, CISSP, RDRP at BAI. The Defense Security Service (DSS) serves as an interface between the government and cleared industry. DSS administers and implements the National Industrial Security Program (NISP) by providing oversight and assistance to cleared contractor facilities to ensure protection of classified information. In short, if your company maintains cleared […]