WEBINAR: Utilizing CDM to help Improve Your Cybersecurity Posture
Security Back to Basics – Why Deploying an Encryption Key Manager Is Critical
The Continuous Diagnostics and Mitigation (CDM) Program delivers automated tools to federal departments and agencies to strengthen their ability to monitor and manage cyber vulnerabilities and the ever-changing threats to their enterprise. Consistent with the Federal Government's deployment of Information Security Continuous Monitoring (ISCM), the CDM Program is a dynamic approach to fortifying the cybersecurity of government networks and systems. Program objectives are to:
- Reduce department and agency threat surface
- Increase visibility of the overall federal cybersecurity posture
- Improve federal cybersecurity response capabilities
- Streamline Federal Information Security Modernization Act (FISMA) reporting
Recently, Fornetix’s VaultCore Key Management solution was validated and is now included on the CDM Approved Product List (APL) and buying vehicle. As a leader in cyber security, Fornetix understands that industry best practices include encryption for sensitive data protection and any strategy that does not also include a centralized encryption key management solution is putting that sensitive data at risk.
In this webcast, Former NSA Senior Executive & Fornetix Board Member Richard Schaeffer, goes over encryption basics and explain how implementing an encryption key management solution can reduce your threat surface area and improve cybersecurity response capabilities.
- What CDM is and what its impact should be on government agencies.
- How CDM can help you determine vendor selection and improve your security strategy.
- How to structure CDM acquisition to create a strong foundation for security throughout your department or agency.
- Understand the impact of cryptography across CDM capabilities.
- How to apply key management and orchestration to CDM.
Mr. Schaeffer is a former Senior Executive with the National Security Agency (NSA), with over 40 years total U.S. Government service, including 15 years as a member of the Defense Intelligence Senior Executive Service. He brings extensive leadership, management and technical experience in the area of Information Security and Intelligence.
Chuck is a technologist, inventor, and entrepreneur. He has extensive knowledge in cyber defense, collaboration solutions, big data analytics, and security software development. He is a former U.S. Army officer, combat veteran, and a recognized thought leader in the security software community. Chuck is a member of the OASIS KMIP and OpenC2 technical committees and is a co-editor for versions 2.0, 2.1, and 3.0 of the KMIP specification.