January 12, 2021
Welcome, Step 0
By Lon J. Berman, CISSP, RDRP Q. The Risk Management Framework (RMF) life cycle is comprised of how many steps? A. Oh, that’s easy, it’s six. Well … not so …
Read ArticleIT Dojo blog: expert insights on cybersecurity, RMF, DoD compliance, certifications, networking, and federal IT. Updated regularly by our instructors.
January 12, 2021
By Lon J. Berman, CISSP, RDRP Q. The Risk Management Framework (RMF) life cycle is comprised of how many steps? A. Oh, that’s easy, it’s six. Well … not so …
Read ArticleJanuary 16, 2020
By Kathryn Daily, CISSP, CAP, RDRP So by now, I’m sure you’ve seen a ton of articles on the Cybersecurity Maturity Model Certification (CMMC) initiative. A lot …
Read ArticleNovember 12, 2019
Dear Dr. RMF, I work in an Army program and I feel like I am getting the hang of RMF, but when the heck do I schedule an independent assessment (SCA-V)? Show Me …
Read ArticleNovember 12, 2019
By Kathryn Daily, CISSP, CAP, RDRP So, in the last edition of the newsletter I wrote about the need for verification of NIST 171 compliance from DoD …
Read ArticleNovember 12, 2019
By Lon J. Berman, CISSP, RDRP Just when folks were beginning to get somewhat comfortable … or, at least, familiar … with the Risk Management Framework (RMF), …
Read ArticleApril 17, 2019
We constantly get asked "Where is the best place to find CISSP practice questions?" and "What sort of resources can you share with me to help me prepare for the …
Read ArticleApril 15, 2019
Dear Dr. RMF, Government IT Security staff work with systems owners to make sure that all systems in the agency have implemented the proper Risk Management …
Read ArticleApril 15, 2019
By Lon J. Berman CISSP, RDRP CNSSI 4009 defines Security Control Inheritance as “a situation in which an information system or application receives protection …
Read ArticleApril 5, 2019
"How much information is in a message?" Huh??? That sentence, in the context of typical use of those words (information & message), doesn't immediately make …
Read Article