Services
Articles by Jeff
Activity
-
ℚ𝕦𝕚𝕔𝕜 ℚ𝕦𝕖𝕤𝕥𝕚𝕠𝕟: does the NIST (and CMMC) definition of a cloud service provider (CSP) kind of suck❓ I can think of several cloud services…
ℚ𝕦𝕚𝕔𝕜 ℚ𝕦𝕖𝕤𝕥𝕚𝕠𝕟: does the NIST (and CMMC) definition of a cloud service provider (CSP) kind of suck❓ I can think of several cloud services…
Liked by Jeff Baldwin, D.Sc.
Licenses & Certifications
-
CMMC Provisional Assessor
Cybersecurity Maturity Model Certification Accreditation Body (CMMC AB)
Issued Expires -
CMMC Provisional Instructor
Cybersecurity Maturity Model Certification Accreditation Body (CMMC AB)
Issued Expires -
Certified Application Security Specialist (CASS)
IACRB
-
CNSSI 4014(A) Information Systems Security Officer (Advanced)
CNSS • Committee on National Security Systems
-
ITIL V3 Foundation Certificate in IT Service Management
-
-
NSTISSI 4011 Information Systems Security (INFOSEC) Professional
CNSS • Committee on National Security Systems
Publications
-
Cyber Supply Chain Risk Management (C-SCRM) across the Defense Industrial Base (DIB): A Cross-Sectional Survey of NISTIR 8276 Key Practices
Capitol Technology University ProQuest Dissertations Publishing
National Institute of Standards and Technology Interagency Report (NISTIR) 8276 identifies a
set of Key Practices in Cyber Supply Chain Risk Management (C-SCRM) that any organization
can use to manage cybersecurity risks associated with their supply chains. NISTIR 8276 was
published in February 2021, and information about the prevalence of these practices has not
previously been researched. Since only 25 organizations were used in the development of
NISTIR 8276, there is…National Institute of Standards and Technology Interagency Report (NISTIR) 8276 identifies a
set of Key Practices in Cyber Supply Chain Risk Management (C-SCRM) that any organization
can use to manage cybersecurity risks associated with their supply chains. NISTIR 8276 was
published in February 2021, and information about the prevalence of these practices has not
previously been researched. Since only 25 organizations were used in the development of
NISTIR 8276, there is limited information about the practices of organizations that were not
included in the creation of NISTIR 8276. The problem researched by this study is that there is a
lack of data regarding the sentiment and current state of implementation of the recommendations
and Key Practices of NISTIR 8276 across the United States Defense Industrial Base (DIB). This
quantitative research study surveyed 121 participants to capture data about the sentiments and
the implementation status of the 8 Key Practices and 24 recommendations from NISTIR 8276.
The survey questionnaire included 46 close-ended questions. The first section of the
questionnaire asked biographical questions that were used as variables to compare results and
test hypotheses. The second section of the questionnaire captured sentiment about the C-SCRM
Key Practices with a Likert scale. The third section of the questionnaire asked participants to
self-report their organization’s implementation status against the 24 recommendations.
Courses
-
Applied Database Management
-
-
Applied Wireless Network Security
-
-
Complementary Security
-
-
Computer Forensics & Incident Handling
-
-
Database Appl and Programng I
-
-
Database Concepts
-
-
Effective Speaking
-
-
Essentials of Info Security
-
-
Financial Accounting
-
-
Fundamentals of Management
-
-
Human Resource Management
-
-
Internal Protection
-
-
Internetworking I
-
-
Internetworking II
-
-
Intro to Information Tech
-
-
Intro to Programming for IT
-
-
Intro to Web Page Development
-
-
Legal Aspects of Computer Security & Information Privacy
-
-
Malicious Software
-
-
Management Communications
-
-
Microcomputer Systems I
-
-
Network & Host Security
-
-
Network Administration
-
-
Network Design Concepts
-
-
Network Systems Security Concepts
-
-
Networking I
-
-
Networking II
-
-
Object-Oriented Programming
-
-
Perimeter Protection
-
-
Precalculus
-
-
Principles of Economics I
-
-
Project Management
-
-
Secure Info Transfer & Storage
-
-
Security Risk Management
-
-
Sft Op and Interoperability
-
-
Spanish I
-
-
Statistics I
-
-
Systems Analysis & Design
-
-
Technical Writing
-
-
Visual Programming & Development
-
-
Vulnerability Mitigation
-
-
Wireless Security
-
Languages
-
English
Native or bilingual proficiency
Recommendations received
-
LinkedIn User
9 people have recommended Jeff
Join now to viewMore activity by Jeff
-
FAST FACTS: Did you know? The key to a multidimensional protection strategy, after employing safeguards for penetration resistance, is to limit the…
FAST FACTS: Did you know? The key to a multidimensional protection strategy, after employing safeguards for penetration resistance, is to limit the…
Liked by Jeff Baldwin, D.Sc.
-
Run don't walk, Entra ID Governance is now available for GCCH. Privileged Identity Management and groups is one of the main capabilities of this new…
Run don't walk, Entra ID Governance is now available for GCCH. Privileged Identity Management and groups is one of the main capabilities of this new…
Liked by Jeff Baldwin, D.Sc.
-
For those of you in the federal government or private sector who deal with Controlled Unclassified Information (CUI), I wanted to share a webinar I…
For those of you in the federal government or private sector who deal with Controlled Unclassified Information (CUI), I wanted to share a webinar I…
Liked by Jeff Baldwin, D.Sc.
-
I have just submitted my Lead CMMC Certified Assessor documents to The CIACO. Being in this industry for way too long, I met it all. I am excited to…
I have just submitted my Lead CMMC Certified Assessor documents to The CIACO. Being in this industry for way too long, I met it all. I am excited to…
Liked by Jeff Baldwin, D.Sc.
-
How did we settle on the idea that LLM-aided investigation = AI SOC? Where's the rest of the SOC? Vendors like Dropzone AI, Prophet Security…
How did we settle on the idea that LLM-aided investigation = AI SOC? Where's the rest of the SOC? Vendors like Dropzone AI, Prophet Security…
Liked by Jeff Baldwin, D.Sc.
-
"...and we will call them ESPs." "Not MSPs, sir?" "No, this will include CSPs and other 3rd party services. It's easier." "But sir...there are…
"...and we will call them ESPs." "Not MSPs, sir?" "No, this will include CSPs and other 3rd party services. It's easier." "But sir...there are…
Liked by Jeff Baldwin, D.Sc.
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More