Services
Articles by Mike
Activity
-
Monitor for unauthorized software installations which could introduce malware or vulnerabilities. #EndpointSecurity #CyberDefense
Monitor for unauthorized software installations which could introduce malware or vulnerabilities. #EndpointSecurity #CyberDefense
Posted by Mike Frieder
-
Conduct regular tabletop exercises involving both IT and leadership teams to improve response coordination. #IncidentResponse #CMMC
Conduct regular tabletop exercises involving both IT and leadership teams to improve response coordination. #IncidentResponse #CMMC
Posted by Mike Frieder
Experience
-
On Call Compliance Solutions
Education
Recommendations received
3 people have recommended Mike
Join now to viewMore activity by Mike
-
𝗩𝗲𝗻𝗱𝗼𝗿 𝗥𝗶𝘀𝗸 If your vendors aren’t secure, neither are you Under DFARS, NIST 800-171 & CMMC, their security is your responsibility. Don’t…
𝗩𝗲𝗻𝗱𝗼𝗿 𝗥𝗶𝘀𝗸 If your vendors aren’t secure, neither are you Under DFARS, NIST 800-171 & CMMC, their security is your responsibility. Don’t…
Shared by Mike Frieder
-
𝗣𝗵𝘆𝘀𝗶𝗰𝗮𝗹 𝗮𝗰𝗰𝗲𝘀𝘀 𝗶𝘀 𝗮 𝘀𝗵𝗼𝗿𝘁𝗰𝘂𝘁 𝗮𝗿𝗼𝘂𝗻𝗱 𝘁𝗲𝗰𝗵𝗻𝗶𝗰𝗮𝗹 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 PE.L1-3.10.1 focuses on limiting who can…
𝗣𝗵𝘆𝘀𝗶𝗰𝗮𝗹 𝗮𝗰𝗰𝗲𝘀𝘀 𝗶𝘀 𝗮 𝘀𝗵𝗼𝗿𝘁𝗰𝘂𝘁 𝗮𝗿𝗼𝘂𝗻𝗱 𝘁𝗲𝗰𝗵𝗻𝗶𝗰𝗮𝗹 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 PE.L1-3.10.1 focuses on limiting who can…
Shared by Mike Frieder
-
Protect authentication secrets such as API keys and tokens in secure vaults. #SecretsManagement #Cybersecurity
Protect authentication secrets such as API keys and tokens in secure vaults. #SecretsManagement #Cybersecurity
Posted by Mike Frieder
-
𝗧𝗵𝗲 𝗖𝗼𝘀𝘁 𝗼𝗳 𝗪𝗮𝗶𝘁𝗶𝗻𝗴 𝗼𝗻 𝗖𝗠𝗠𝗖 Delayed CMMC readiness often leads to higher remediation costs and operational disruption. Early…
𝗧𝗵𝗲 𝗖𝗼𝘀𝘁 𝗼𝗳 𝗪𝗮𝗶𝘁𝗶𝗻𝗴 𝗼𝗻 𝗖𝗠𝗠𝗖 Delayed CMMC readiness often leads to higher remediation costs and operational disruption. Early…
Shared by Mike Frieder
-
Implement automated alerting for critical security events to reduce response time. #SecurityOps #CMMC
Implement automated alerting for critical security events to reduce response time. #SecurityOps #CMMC
Posted by Mike Frieder
-
Ensure all systems are protected with host-based firewalls and configured securely. #EndpointSecurity #CyberDefense
Ensure all systems are protected with host-based firewalls and configured securely. #EndpointSecurity #CyberDefense
Posted by Mike Frieder
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content