Cimcor Resource Library

Download the latest Solution Briefs, Reports, Podcasts, and More

Webinars

CMMC SERIES PART 2: CIS Best Practices to On-Ramp, align and achieve CMMC compliance(ON-DEMAND)

Tony Sager, Senior Vice President and Chief Evangelist of Center for Internet Security discusses CIS Controls and how CIS best practices can help with CMMC compliance implementation. This LIVE discussion will feature a short presentation followed by Q & A regarding CMMC Compliance.

CMMC SERIES PART 1: A Comprehensive Overview of CMMC (ON-DEMAND)

Jeff Dalton of the CMMC-AB Board discusses with Cimcor "Everything You Need to Know About CMMC Certification". Dalton provides a short presentation addressing the three key topics of "Why", "How",  and "When" followed by an entire session of Q & A.

CMMC Series Part 3: DIBs and CMMC Requirements: Simplifying the Continuous Audit Process with MSSPs (ON-DEMAND)

Dasha Deckwerth, CISO & Global Cybersecurity Consultant, discusses concerns regarding the audit process for CMMC requirements.

CMMC SERIES PART 4: Technical controls and requirements for Organizations
(ON-DEMAND)

In this webinar, LogRhythm and Cimcor discuss CMMC coverage with accompanying solutions and how those solutions can help augment compliance with CMMC at the various levels of certification.  Additionally, Cimcor and LogRhythm discuss the considerations to make when using SIEM and FIM technologies for compliance. 

Reduce Breaches by 90% with 6 Simple Steps (ON-DEMAND)

Join Tony Sager, Senior Vice President and Chief Evangelist of Center for Internet Security and Robert Johnson, CEO of Cimcor, in an interactive webinar as they discuss CIS Controls and the importance of following a prescriptive approach, one that is proven to auto-detect 90% of all security breaches.

A Redefined National Approach to Cyber Resilience (ON-DEMAND)

In this webinar, co-hosted by CIS CyberMarket partner Cimcor, Mike Echols, former senior cybersecurity leader for U.S. DHS and author of Secure Cyber Life: The Government is Not Coming to Save You, discusses the need for a redefined national approach to cyber resilience. In this discussion, we pull the band-aid off and review the facts, which if embraced, may lead to meaningful national change.

Podcasts

PODCASTS WITH CIMCOR
imageforblog
Are All FIMs Created Equal?

Traditional FIM informs you of what files have changed via polling. Next-Gen FIM/system integrity monitoring provides changes and alerts in real-time.

imageforblog
Mitigating Zero-Day Threats

The real key to securing your infrastructures from zero-day attacks? Understanding when the state of assets in your IT infrastructure change.

imageforblog
Enhancing SIEM Data with File Integrity Monitoring

SIEMs/log management is critical and challenging. Feeding data into SIEMs from a file and system integrity monitoring solution makes it easy

imageforblog
Compliance and Vulnerabilities with Tom Cornelius

Listen to Tom Cornelius of Compliance Forge discuss compliance challenges and managing vulnerabilities for organizations

imageforblog
Defense in Depth Strategies With Tony Sager

Tony Sager of CIS discusses how defense in depth strategies have changed over time and how to strategically align with security.

imageforblog
Greatest Cybersecurity Threats With Mike Echols

Michael A. Echols discusses the latest views on data security and the importance of system integrity monitoring and best practices for businesses. 

imageforblog
Security Frameworks and CIS Controls

The CIS Controls and CIS Benchmarks are discussed with security frameworks in the latest podcast with Cimcor.

imageforblog
System Integrity Monitoring Best Practices

File and system integrity monitoring podcast on maintaining best practices for security and compliance with holistic, next-gen system integrity monitoring.

imageforblog
Understanding System Integrity

Cybercrime Podcast with Cimcor CEO Robert E. Johnson, III. In this podcast, Robert discusses understanding system integrity.

imageforblog
PCI DSS and Continuous Monitoring

The latest view on PCI-DSS Compliance and the concept of Continuous monitoring and security are discussed

imageforblog
Container Security and Vulnerabilities

Cloud security, data security, and the importance of system integrity monitoring and best practices for businesses regarding file integrity monitoring are discussed

imageforblog
The Community Defense Model

Tony Sager discusses the latest views on data security and the importance of system integrity monitoring and best practices for businesses regarding FIM