Category: CISO Forum

Streamlining CMMC Compliance: Insights From Industry Experts

Streamlining CMMC Compliance: Insights From Industry Experts

Achieving CMMC compliance is crucial for organizations dealing with the Department of Defense (DoD). During a recent Fortify Experts CISO roundtable, security leaders shared their strategies and insights on streamlining the CMMC compliance process.  Brian Rhodes, a certified CMMC assessor with iFortriss provided an overview presentation of CMMC which can be found here: CMMC Overview and […]

Continue Reading

CISO Forum: Securing AI – Cybersecurity Leaders’ Take On Generative AI and LLMs

A Deep Dive into AI and the Concerns and Strategies of Security Leaders With the rapid adoption of Generative AI and Large Language Models (LLMs), a subset of Generative AI, such as OpenAI’s ChatGPT and Google’s BARD and others, securing a business against cyber threats just became infinitely harder. At the recent CISO Executive Forum […]

Continue Reading

CISO FORUM:  Navigating Managed Security Service Providers (MSSPs): Ensuring Successful Engagements

CISO FORUM: Navigating Managed Security Service Providers (MSSPs): Ensuring Successful Engagements

Outsourcing or insourcing decisions can be complex, but Managed Security Service Providers (MSSPs) offer a viable solution for various security organizational needs. The recent Fortify Experts CISO Forum explored the decision-making process and the importance of effectively evaluating and working with MSSPs.  Key topics covered in the Forum included defining expectations through MSSP evaluations, contracts, […]

Continue Reading

CISO Forum Summary- Best Practices for 3rd Party Security Assessments

CISO Forum Summary- Best Practices for 3rd Party Security Assessments

CISO Forum Summary- Best Practices for 3rd Party Security Assessments Every month, Fortify Experts holds CISO Round Tables discussing the latest trends and topics.  Recently, we discussed the best practices around 3rd Party Security Assessments. Suggested Best Practices:  The security leaders on the forum outlined several steps to establishing a vendor assessment program. Step 1: […]

Continue Reading