<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Kathleen Hadaway, Author at Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/author/kathleen-hadaway/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/author/kathleen-hadaway/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Tue, 21 Jul 2020 12:35:11 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>Kathleen Hadaway, Author at Third Rock</title>
	<link>https://thirdrock.com/blog/author/kathleen-hadaway/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>Taylor Hersom added to CompTIA Cybersecurity Advisory Board</title>
		<link>https://thirdrock.com/blog/2020/07/14/taylor-hersom-added-to-comptia-cybersecurity-advisory-board/</link>
		
		<dc:creator><![CDATA[Kathleen Hadaway]]></dc:creator>
		<pubDate>Tue, 14 Jul 2020 18:10:36 +0000</pubDate>
				<category><![CDATA[Press Release]]></category>
		<category><![CDATA[Advisory Board]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[Taylor Hersom]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9293</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/07/14/taylor-hersom-added-to-comptia-cybersecurity-advisory-board/">Taylor Hersom added to CompTIA Cybersecurity Advisory Board</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[

<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Taylor Hersom, Vice President of Business Development for <a href="http://www.cybercompass.co/">CyberCompass®</a> and head of virtual services for Third Rock, has been asked to serve on the very prestigious  <a href="https://www.comptia.org/about-us/advisory-boards/comptia-cybersecurity-advisory-board">CompTIA Cybersecurity Advisory Board (CCAB)</a>. <a href="https://www.comptia.org/">CompTIA</a> is the world&#8217;s leading tech association as well as a thought and action leader. CCAB addresses many of the most pressing cybersecurity concerns facing business and government. The board works to identify opportunities for CompTIA to develop cybersecurity initiatives that advance our nation’s cybersecurity readiness. In addition, the CCAB assesses current CompTIA activities relating to cybersecurity and recommends how to integrate those efforts with other thought leaders on the topic, while also identifying gaps in the cybersecurity ecosystem that CompTIA might consider filling. </p>
<p>Hersom will be working with thought leaders from higher education, legal and cybersecurity fields. The CCAB’s main purpose is to provide a venue where these members can discuss the most critical issues the industry faces, leading to prioritized projects and actionable results. Recently, CompTIA has been actively involved in working with  Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) to maintain critical functions throughout the COVID-19 pandemic (see full article <a href="https://www.comptia.org/newsroom/press-releases/2020/05/11/watch-it-industry-briefing-on-cisa-covid-19-response-efforts">here</a>) as well to providing thought leadership with emerging transformational technologies such as 5G. See all of their latest news and <a href="https://www.comptia.org/newsroom/press-releases">press releases</a>.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>

<p>The post <a href="https://thirdrock.com/blog/2020/07/14/taylor-hersom-added-to-comptia-cybersecurity-advisory-board/">Taylor Hersom added to CompTIA Cybersecurity Advisory Board</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9293</post-id>	</item>
		<item>
		<title>Third Rock welcomes Taylor Hersom in dual roles</title>
		<link>https://thirdrock.com/blog/2020/04/16/third-rock-welcomes-taylor-herson-in-dual-roles/</link>
		
		<dc:creator><![CDATA[Kathleen Hadaway]]></dc:creator>
		<pubDate>Thu, 16 Apr 2020 18:14:41 +0000</pubDate>
				<category><![CDATA[Press Release]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9032</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/04/16/third-rock-welcomes-taylor-herson-in-dual-roles/">Third Rock welcomes Taylor Hersom in dual roles</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[

<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: left;"><img data-recalc-dims="1" fetchpriority="high" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Taylor-bw.png?resize=276%2C300&#038;ssl=1" width="276" height="300" alt="" class="wp-image-9028 aligncenter size-medium" style="float: right;" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/Taylor-bw.png?resize=276%2C300&amp;ssl=1 276w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Taylor-bw.png?w=416&amp;ssl=1 416w" sizes="(max-width: 276px) 100vw, 276px" />Round Rock, TX, April 15, 2020 – Third Rock, a cybersecurity and compliance firm, and creator of CyberCompass® cyber risk management software, is excited to announce the addition of Taylor Hersom to its team to serve in a dual capacity. Mr. Hersom will be heading up CyberCompass® distribution channel development. His specific goal will be to help operationalize channel partners in translating cyber risks to better market their cybersecurity solutions, stated Robert Felps, CEO of Third Rock and CyberCompass® LLC.</p>
<p>Mr. Hersom&#8217;s previous experience was with Deloitte risk management practice. He recently served in helping lead business development for a cybersecurity firm that promoted CyberCompass®. His background provides a unique set of skills in translating how cyber risk management can drive the optimization of cybersecurity and compliance solutions. Mr. Hersom has been using CyberCompass® for over a year with his previous customers. &#8220;Most cyber risk management tools focus on technology, so that leaves companies with a false sense of security and lack of insights into their cyber risk. I have worked with several software applications, and I haven&#8217;t seen anything with the potential and power of CyberCompass® to deliver a complete 360-degree integration across people, processes, technology, and vendors,&#8221; said Hersom.</p>
<p>&#8220;We are excited to add Taylor to our team, especially during this time when businesses need our help in getting higher levels of cybersecurity and compliance quickly,&#8221; stated Felps. &#8220;Taylor brings a depth of knowledge and unique insight to rapidly improve our automation and usability in  assessing cyber risk, managing remediation, and ultimately improving their cyber protection.&#8221;</p>
<p>Hersom has also been tapped to lead Third Rock&#8217;s virtual services growing practice. Third Rock developed CyberCompass® software to provide faster, more complete cybersecurity and compliance at an affordable price. Given the impact on businesses with COVID-19, Third Rock clients are seeking to have virtual Chief Information Security Officer and virtual Chief Compliance Officer expertise as they quickly transition their businesses and improve cybersecurity with a dispersed workforce. &#8220;Having Taylor lead our virtual practice within Third Rock allows him to be involved with understanding client needs as they change and translating those needs to CyberCompass® enhancements,&#8221; stated Felps.</p>
<h4>About Third Rock</h4>
<p>Third Rock is a cyber risk and compliance management professional services firm. Based in Round Rock, Texas, Third Rock services include risk assessments, remediation, and rapid incident response in less 65% less time than other firms. Third Rock built a turnkey, simplified, best in class cyber risk management, cybersecurity and compliance software CyberCompass®.</p>
<h4>About CyberCompass® LLC</h4>
<p>CyberCompass® cloud-based software empowers and enables businesses to manage and monitor their cyber risk at a holistic level. It is the only cyber risk management and compliance software with one assessment to meet multi standards for both cybersecurity and government privacy regulation such as HIPAA, CCPA, and GDPR. The platform includes tools and guidance for hardening an organization&#8217;s IT systems, refining their operational processes, engaging employees with cyber training, and managing vendor compliance. Excess Line Association of New York (ELANY) offers a complimentary subscription to CyberCompass™ for active members to become compliant. CyberCompass®, LLC was recently established as it’s own legal entity.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>

<p>The post <a href="https://thirdrock.com/blog/2020/04/16/third-rock-welcomes-taylor-herson-in-dual-roles/">Third Rock welcomes Taylor Hersom in dual roles</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9032</post-id>	</item>
		<item>
		<title>Third Rock welcomes Mike Moran, CISSP, as a Senior Security Advisor</title>
		<link>https://thirdrock.com/blog/2018/08/20/third-rock-welcomes-mike-moran-cissp-as-a-senior-security-advisor/</link>
		
		<dc:creator><![CDATA[Kathleen Hadaway]]></dc:creator>
		<pubDate>Tue, 21 Aug 2018 00:57:13 +0000</pubDate>
				<category><![CDATA[Press Release]]></category>
		<category><![CDATA[Advisory Board]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[security advisory]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5828</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/08/20/third-rock-welcomes-mike-moran-cissp-as-a-senior-security-advisor/">Third Rock welcomes Mike Moran, CISSP, as a Senior Security Advisor</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" decoding="async" class="aligncenter size-full wp-image-5985" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Mike-e1554312626909.jpg?resize=349%2C344&#038;ssl=1" alt="" width="349" height="344" style="float: right;" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/Mike-e1554312626909.jpg?w=349&amp;ssl=1 349w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Mike-e1554312626909.jpg?resize=300%2C296&amp;ssl=1 300w" sizes="(max-width: 349px) 100vw, 349px" /></p>
<p>Round Rock, TX, July 9, 2018 – Third Rock, cyber risk management firm, announces the addition of Mike Moran, CISSP to its Board of Advisors as Senior Security Advisor. Moran is a veteran of the software industry and is focused primarily on applications and development tools, with a secondary focus on high availability, high traffic web sites.   His past projects include architecting and supporting real-time online access to three Olympics and maintaining a healthcare billing system with over 100 million bills per month.</p>
<p>“I’ve known Mike for over 20 years and consider him one of the best database and security experts in the world.” says Robert Felps, Third Rock CEO. “He also has proven experience as a site reliability engineer on high traffic websites with high availability demands, which makes him a great system expert of a broad range of UNIX and Linux systems.”</p>
<p>Moran stated that “Third Rock is advancing cyber risk to deliver a simple, complete set of tools for cyber risk not matched by competitors that clients can easily manage against cyber threats.  I am excited to be part of this innovative team.” He will focus on improving application robustness, tightening security implementations and providing cyber security expertise for Third Rock’s unique software, CyberCompass™.’ He recently completed network and vulnerability scans for a company and discovered several vulnerabilities that had not been uncovered by their IT functions.</p>
<p>Moran is a Certified Information Systems Security Professional, earning his undergraduate degree in Computer Science from Purdue University and his graduate degree in Technology Commercialization from the University of Texas at Austin.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/08/20/third-rock-welcomes-mike-moran-cissp-as-a-senior-security-advisor/">Third Rock welcomes Mike Moran, CISSP, as a Senior Security Advisor</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5828</post-id>	</item>
		<item>
		<title>Third Rock&#8217;s New GDPR Assessment Capabilities Expedite Compliance</title>
		<link>https://thirdrock.com/blog/2018/04/26/third-rocks-new-gdpr-assessment-capabilities-expedite-compliance/</link>
		
		<dc:creator><![CDATA[Kathleen Hadaway]]></dc:creator>
		<pubDate>Thu, 26 Apr 2018 15:00:31 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Press Release]]></category>
		<category><![CDATA[benchmarking]]></category>
		<category><![CDATA[Body of Evidence]]></category>
		<category><![CDATA[corrective actions]]></category>
		<category><![CDATA[Cyber Confidence℠]]></category>
		<category><![CDATA[cyber risk management software]]></category>
		<category><![CDATA[CyberCompass™]]></category>
		<category><![CDATA[GDPR risk assessment]]></category>
		<category><![CDATA[General Data Protection Regulation Risk Assessment]]></category>
		<category><![CDATA[HIPAA Security Risk Assessment]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[SECURETexas]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[vulnerability scans]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5491</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/04/26/third-rocks-new-gdpr-assessment-capabilities-expedite-compliance/">Third Rock&#8217;s New GDPR Assessment Capabilities Expedite Compliance</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: center;"></p>
<p><strong><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5522 size-medium" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?resize=300%2C214&#038;ssl=1" alt="" width="300" height="214" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?resize=300%2C214&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?resize=768%2C549&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?resize=1024%2C731&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?w=2160&amp;ssl=1 2160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?w=3240&amp;ssl=1 3240w" sizes="(max-width: 300px) 100vw, 300px" /></strong></p>
<h2 style="text-align: center;"><span style="font-size: 12px;"><strong><em>More than half of companies impacted by GDPR are not ready for May 25<sup>th</sup> deadline</em></strong></span></h2>
<p><strong>Round Rock, TX – April 26, 2018</strong> – Third Rock, a supplier of cyber risk management software, announced today the launch of its General Data Protection Regulation (GDPR) Risk Assessment, the newest enhancement to its cyber risk management software to help companies become GDPR compliant before the May 25, 2018 deadline set by the European Union (EU).</p>
<p>GDPR applies to every company that collects, processes or stores an EU citizen’s data, regardless of sector, size and geographical location. The consulting firm <a href="https://www.gartner.com/newsroom/id/3701117">Gartner</a> estimates that more than half of the companies that are subject to the GDPR will not be in compliance this year and will be at risk for fines by the EU. A risk assessment is a required action to meet GDPR compliance regulations for protecting EU citizens’ data.</p>
<p>The full integration of the GDPR assessment into Third Rock’s current web based cyber risk management software platform, <a href="http://www.compassdb.io">CyberCompass™</a>, allows companies to quickly complete the assessment and then automatically generate a prioritized corrective action plan.  Robert Felps, CEO of Third Rock, explained, “This software provides rapid benchmarking of an organization’s compliance status, prioritizes needed corrective actions, and maintains the Body of Evidence in the event of an audit by regulatory authorities.  Companies can then choose to implement the corrective actions themselves, collaborate with Third Rock, or engage their current compliance consulting firm. Most companies can achieve GDPR compliance in approximately two to twelve weeks.”</p>
<p>Third Rock’s CyberCompass™ GDPR Risk Assessment provides a comprehensive, user-friendly experience. Most companies use a mix of forms and spreadsheets to manage cyber risk. Natan Bradbury, CEO of <a href="http://www.vitechpros.com">VITECH Pros </a>who partnered with Third Rock to test the new assessment stated, &#8220;You don&#8217;t know how long I&#8217;ve been looking for an application like this!  I&#8217;ve been cobbling together Excel and Word documents and some other tools to complete assessments.”  CyberCompass™ has been documented to achieve 65% time savings compared to other assessment approaches.</p>
<p><strong> </strong><strong style="font-size: 12px;">About Third Rock</strong></p>
<p>Third Rock specializes in simplifying cyber risk management to enable organizations to holistically assess and manage their cyber risk by engaging employees, refining processes, and hardening technical systems, creating a culture of Cyber Confidence℠. Third Rock’s CyberCompass™ software includes: HIPAA, GDPR, NIST SP 800-171, and <a href="http://www.thsa.org">SECURETexas</a> assessments, along with comprehensive workstation and network vulnerability scans. Third Rock is proud to partner with <a href="http://www.tmlt.org">Texas Medical Liability Trust</a> and Texas Health Services Authority. Learn more at <a href="http://www.thirdrock.com#www.thirdrock.com">ThirdRock.com</a>.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/04/26/third-rocks-new-gdpr-assessment-capabilities-expedite-compliance/">Third Rock&#8217;s New GDPR Assessment Capabilities Expedite Compliance</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5491</post-id>	</item>
		<item>
		<title>Third Rock Enhances SECURETexas Capabilities</title>
		<link>https://thirdrock.com/blog/2018/03/21/third-rock-enhances-securetexas-capabilities/</link>
		
		<dc:creator><![CDATA[Kathleen Hadaway]]></dc:creator>
		<pubDate>Wed, 21 Mar 2018 15:00:48 +0000</pubDate>
				<category><![CDATA[Press Release]]></category>
		<category><![CDATA[annual security risk assessment]]></category>
		<category><![CDATA[automated risk management process]]></category>
		<category><![CDATA[collaboration tools]]></category>
		<category><![CDATA[CompassDB]]></category>
		<category><![CDATA[cyber risk]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[prioritized corrective action list]]></category>
		<category><![CDATA[prioritized risk management plan]]></category>
		<category><![CDATA[reference library]]></category>
		<category><![CDATA[SECURETexas]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[THSA]]></category>
		<category><![CDATA[user training]]></category>
		<category><![CDATA[vendor management]]></category>
		<category><![CDATA[vulnerability and compliance scanning tool]]></category>
		<category><![CDATA[workforce compliance training]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5246</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/03/21/third-rock-enhances-securetexas-capabilities/">Third Rock Enhances SECURETexas Capabilities</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: center;"><strong>Third Rock Enhances SECURETexas Capabilities</strong></p>
<p style="text-align: center;"><em>Customized to over 20 types of healthcare specialties for better</em></p>
<p style="text-align: center;"><em>protection of patient information against cyber threats</em><em> </em></p>
<em> </em>

<strong>Austin, TX – March 21, 2018</strong> – Third Rock, a preferred vendor for Texas Health Services Authority (THSA), has further simplified the SECURETexas certification process by offering a unique customized security risk assessment approach based on an organization’s practice area.

Third Rock has customized its web-based security risk assessment tool for more than 20 different healthcare practice types, including urology, pediatrics, orthopedics, urgent care, primary care, optometry, dentistry, and home health, saving users’ time by assessing only those issues pertinent to that practice type.  No other vendor offers this level of automated customization for the SECURETexas certification program.

The SECURETexas certification program is included in <a href="https://www.compassdb.io/">Third Rock’s CompassDB</a><strong>™</strong><sup> </sup>cyber risk management platform. Third Rock has shown that organizations can realize a 66% reduction in work hours by utilizing Third Rock’s Compass DB<strong>™</strong> software compared to other labor-intensive security risk assessment approaches.  Third Rock’s CompassDB<strong>™</strong> reduces the complexity of assessing and managing cyber security and compliance, especially for smaller and medium size health organizations that are most vulnerable to cyber attacks.

“Healthcare organizations are highly-targeted by cyber threats yet have the lowest utilization of risk management software to help manage their risks.  With cyber security now an urgent issue for all healthcare entities, our goal is to make protecting patient information easy and intuitive with a one-stop solution,“ stated Ed Jones, Third Rock’s Chief Compliance Officer.

<img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5252" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/SECURETexas_Preferred_Vendor_Button.png?resize=184%2C102&#038;ssl=1" alt="SECURETexas Preferred Vendor stamp of approval" width="184" height="102" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/SECURETexas_Preferred_Vendor_Button.png?resize=300%2C166&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/SECURETexas_Preferred_Vendor_Button.png?resize=768%2C426&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/SECURETexas_Preferred_Vendor_Button.png?resize=1024%2C568&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/SECURETexas_Preferred_Vendor_Button.png?w=2160&amp;ssl=1 2160w" sizes="(max-width: 184px) 100vw, 184px" />Additional focused and customizable surveys have been programmed into Compass DB<strong>™</strong><sup> </sup>to meet the comprehensive SECURETexas requirements.  These surveys are fully integrated into the Compass DB<strong>™</strong><sup> </sup>platform and provide direct references and links to Texas regulations. Completion of the SECURETexas assessment in Compass DB<strong>™</strong> automatically generates a prioritized risk management plan, including the corrective actions required, along with policies and procedures, user training, vendor management, a reference library and extensive collaboration tools.

Completing an annual security risk assessment is a requirement for meeting federal HIPAA compliance regulations, while SECURETexas ensures Texas’ privacy and information protection requirements are met. SECURETexas certification can be a mitigating factor when a court or state licensure agency imposes a penalty for violation of the Texas Medical Records Privacy Act.

<strong>About Third Rock</strong>

Based in Round Rock, Texas, Third Rock is a cyber risk and compliance management firm.  Third Rock has built a turnkey, simplified software platform, <a href="http://www.compassdb.io">CompassDB</a><strong>™</strong><sup> </sup>to give organizations the ability to manage and monitor their cyber risk at a holistic level. The platform includes tools and guidance for hardening an organization’s IT systems, refining their processes, and engaging employees to create a culture of Cyber Confidence. Third Rock is the only firm to include a comprehensive compliance and vulnerability scan of an organization’s computers with their SECURETexas assessments. Learn more at <a href="http://www.thirdrock.com#www.thirdrock.com">ThirdRock.com</a>.<strong> </strong>

<strong>About THSA</strong>

The Texas Health Services Authority (THSA) was established by the Texas Legislature for the purpose of promoting, implementing, and facilitating the secure electronic exchange of health information. The THSA accomplishes this purpose through its health information exchange (HIE) and privacy and security certification and supporting programs. Learn more about the THSA at <a href="http://www.thsa.org">www.thsa.org</a>.</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/03/21/third-rock-enhances-securetexas-capabilities/">Third Rock Enhances SECURETexas Capabilities</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5246</post-id>	</item>
		<item>
		<title>Third Rock Team Presenting at ISSA Austin</title>
		<link>https://thirdrock.com/blog/2018/03/19/third-rock-team-presenting-at-issa-austin/</link>
		
		<dc:creator><![CDATA[Kathleen Hadaway]]></dc:creator>
		<pubDate>Mon, 19 Mar 2018 17:58:02 +0000</pubDate>
				<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[cyber confidence]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ISSA Austin Chapter meeting]]></category>
		<category><![CDATA[presentation]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5237</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/03/19/third-rock-team-presenting-at-issa-austin/">Third Rock Team Presenting at ISSA Austin</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><b>Boost your Cyber Confidence!</b></p>
<p>Get some tips and inspiration when Third Rock’s Julie Rennecker, Robert Felps, and Mike Moran present <em>Healthcare: Transforming an Industry from Cyber Victim to Cyber Confident</em> at the <a href="https://austinissa.org/">ISSA Austin Chapter</a> meeting tomorrow, March 20.</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/03/19/third-rock-team-presenting-at-issa-austin/">Third Rock Team Presenting at ISSA Austin</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5237</post-id>	</item>
		<item>
		<title>Cyber Security: Is it Really a Matter of Life or Death?</title>
		<link>https://thirdrock.com/blog/2018/02/15/cyber-security-is-it-really-a-matter-of-life-or-death/</link>
		
		<dc:creator><![CDATA[Kathleen Hadaway]]></dc:creator>
		<pubDate>Thu, 15 Feb 2018 23:21:12 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[board member fiduciary duties]]></category>
		<category><![CDATA[cyber liability insurance]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[five building blocks of patient information safety]]></category>
		<category><![CDATA[NRHA webinar]]></category>
		<category><![CDATA[RHIA webinar]]></category>
		<category><![CDATA[stolen medical records]]></category>
		<category><![CDATA[webinar]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5163</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/02/15/cyber-security-is-it-really-a-matter-of-life-or-death/">Cyber Security: Is it Really a Matter of Life or Death?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h4>A webinar brought to you by the National Rural Health Association and Rural Hospital Insurance of America</h4>
<p>If you are the CEO, CFO or COO of a Rural Hospital then this <a href="https://register.gotowebinar.com/register/4654359552542444291">webinar</a> is for YOU!<br />
But, it is open to all healthcare management.</p>
<p>On <strong>February 21, from 2:00 pm &#8211; 3:00 pm</strong> join the <a href="http://rhiaprogram.com/">Rural Hospital Insurance of America</a> (RHIA) program manager in conversation with two of America&#8217;s leading experts in cyber threat protection, prevention, detection, and response to learn how to stay ahead of the growing and evolving threat cybercrime poses to your patients, your patients&#8217; data, your hospital, and yourself.</p>
<p>Learning objectives include:</p>
<ul>
<li>The common myths that attract cyber risk</li>
<li>Five building blocks of patient information safety</li>
<li>The typical policy pitfalls to avoid while optimizing your primary mechanism for risk transfer, cyber liability insurance</li>
<li>How to overcome the crushing complexity of compliance</li>
<li>How modern risk management transforms the cyber liability into a strategic asset</li>
</ul>
<p>Patient&#8217;s lives are at stake when medical records go missing, are held hostage, or are corrupted by fraudulent use.  And, without adequate preparation and protection, a cyber breach can put your hospital&#8217;s ability to stay in business at risk.  Plus your liability and the liability of your board could be on the line.</p>
<p>How severe is this risk?  Consider what happened in 2017:</p>
<ul>
<li>Over 200,000 data records lost or stolen every hour</li>
<li>Cybercriminals paid only $1 for a stolen credit card but shelled out $50 to $350 for a single ePHI record</li>
<li>33% of all Americans&#8217; medical records stolen by year end</li>
</ul>
<p>With an average of one million new cyber threats released every day and the cost of a data breach to American businesses &#8211; including rural hospitals &#8211; ranging from $800,000 to $3.6 million, this is a life or death matter.</p>
<p>For an up-to-the-minute assessment of the cyber liability environment and the questions you and your board members should be asking to satisfy your fiduciary duties, <a href="https://register.gotowebinar.com/register/4654359552542444291">register now</a>.</p>
<p>Presenters:</p>
<p><a href="https://www.winstead.com/People/Sarah-Churchill-Llamas">Sarah Churchill Llamas</a>, of the law firm Winstead PC</p>
<p>Robert Felps, founder of the compliance and management firm Third Rock</p>
<p><a href="http://healthsure.com/about/the-healthsure-team/brant-couch-cpa-cic-2/">Brant Couch</a>, webinar moderator</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/02/15/cyber-security-is-it-really-a-matter-of-life-or-death/">Cyber Security: Is it Really a Matter of Life or Death?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5163</post-id>	</item>
		<item>
		<title>Protect Your Clients, Your Clients&#8217; Data, and Your Business &#8211; a webinar offered by Developmental Services Network</title>
		<link>https://thirdrock.com/blog/2018/01/11/protect-your-clients-your-clients-data-and-your-business-a-webinar-offered-by-developmental-services-network/</link>
		
		<dc:creator><![CDATA[Kathleen Hadaway]]></dc:creator>
		<pubDate>Thu, 11 Jan 2018 21:00:29 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[DSN webinar]]></category>
		<category><![CDATA[webinar]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4918</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/01/11/protect-your-clients-your-clients-data-and-your-business-a-webinar-offered-by-developmental-services-network/">Protect Your Clients, Your Clients&#8217; Data, and Your Business &#8211; a webinar offered by Developmental Services Network</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="wp-image-427 alignleft" style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/profile-robert-felps.jpg?resize=183%2C183&#038;ssl=1" alt="" width="183" height="183" /><span style="font-size: 12px;"></span></p>
<p><span style="font-size: 12px;">Robert Felps, CEO of Third Rock, is proud to present a cybersecurity webinar &#8211; </span><strong style="font-size: 12px;"><em>Protect Your Clients, Your Clients&#8217; Data, and Your Business</em></strong><span style="font-size: 12px;"> &#8211; for Developmental Services Network on Thursday, January 18, 2018, 10:30 am &#8211; 11:30 am PST.</span></p>
<ul>
<li><strong><em>Did you know your client data is worth 50 times more than a credit card number on the dark web?</em></strong></li>
<li><strong><em>A HIPAA approved client management system does not make you HIPAA compliant, nor does it completely protect your client data.</em></strong></li>
<li><strong><em>Learn steps to improve your cybersecurity and achieve HIPAA compliance easily and affordably!</em></strong></li>
</ul>
<p>For more than 15 years Developmental Services Network (DSN) has served its members as California&#8217;s only trade association dedicated exclusively to providers of intermediate care facility (ICF) services for people with developmental disabilities.  DSN&#8217;s strength comes from its members who recognize the importance of working together, sharing information, conducting and receiving training, and providing critical regulatory and fiscal analysis of the activities of the various governmental entities involved in oversight and funding of the program.</p>
<p>Registration is FREE for Developmental Services Network members. Registration for non-members is $50.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/01/11/protect-your-clients-your-clients-data-and-your-business-a-webinar-offered-by-developmental-services-network/">Protect Your Clients, Your Clients&#8217; Data, and Your Business &#8211; a webinar offered by Developmental Services Network</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4918</post-id>	</item>
		<item>
		<title>Third Rock Streamlines SECURETexas Privacy and Security Certification</title>
		<link>https://thirdrock.com/blog/2017/12/19/third-rock-streamlines-securetexas-privacy-and-security-certification/</link>
		
		<dc:creator><![CDATA[Kathleen Hadaway]]></dc:creator>
		<pubDate>Tue, 19 Dec 2017 15:00:42 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Press Release]]></category>
		<category><![CDATA[automated risk management process]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[maintained policies and procedures]]></category>
		<category><![CDATA[SECURETexas]]></category>
		<category><![CDATA[THSA]]></category>
		<category><![CDATA[vulnerability and compliance scanning tool]]></category>
		<category><![CDATA[workforce compliance training]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4898</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/12/19/third-rock-streamlines-securetexas-privacy-and-security-certification/">Third Rock Streamlines SECURETexas Privacy and Security Certification</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><strong>Round Rock, TX – December 19, 2017</strong> – Third Rock, who was awarded preferred vendor status with Texas Health Services Authority (THSA) in August this year, has streamlined the SECURETexas certification process to help healthcare organizations reduce liability by better securing patients’ Protected Health Information (PHI).

Third Rock has incorporated the question set for the SECURETexas certification program into&nbsp;<a href="https://www.compassdb.io/">CompassDB</a>, Third Rock&#8217;s compliance management system. &nbsp;Third Rock has shown that by utilizing CompassDB, organizations can reduce man-hours for performing and reporting a security risk assessment by up to 66%, compared to other security risk assessment tools and methods.

“We understand that most healthcare practices want to improve their cybersecurity, but don’t have the expertise or time to perform a comprehensive risk assessment.&nbsp; Our goal is to make protecting patient information easy and affordable as cyber threats in healthcare continue to increase,“ stated Ed Jones, Third Rock’s Chief Compliance Officer.

The SECURETexas certification is available for covered entities and business associates operating in Texas that are subject to privacy and security regulations. Certification involves engaging a SECURETexas Preferred Vendor, such as Third Rock, to assess&nbsp;the covered entity’s compliance&nbsp;against the SECURETexas privacy and security&nbsp;<a href="http://texreg.sos.state.tx.us/public/readtac$ext.TacPage?sl=R&amp;app=9&amp;p_dir=&amp;p_rloc=&amp;p_tloc=&amp;p_ploc=&amp;pg=1&amp;p_tac=&amp;ti=1&amp;pt=15&amp;ch=390&amp;rl=2">standards</a>, then&nbsp;remediating any identified&nbsp;deficiencies.&nbsp; SECURETexas certification can be a mitigating factor when a court or state licensure agency imposes a penalty for violation of the Texas Medical Records Privacy Act.

Third Rock’s CompassDB software is a comprehensive cloud-based Compliance Management Platform that makes managing cybersecurity and compliance easier and less costly, especially for smaller and medium size healthcare organizations that are most vulnerable to cyber attacks. This tool will help healthcare entities attain SECURETexas Certification, as well as meet HIPAA compliance requirements, with capabilities that include an automated risk management process, vulnerability and compliance scanning tool, workforce compliance training, and continually updated policies and procedures.

&nbsp;

<strong>About Third Rock</strong>

Third Rock is a cybersecurity and compliance firm based in Round Rock, Texas whose purpose is to help businesses protect their customers’ information. Third Rock offers a unique turnkey, simplified approach to cybersecurity and compliance that engages employees, refines processes, and updates technology to move organizations to a culture of compliance and protection. Learn more at <a href="http://www.thirdrock.com">ThirdRock.com</a>.

<strong>About THSA</strong>

The Texas Health Services Authority (THSA) was established by the Texas Legislature for the purpose of promoting, implementing, and facilitating the secure electronic exchange of health information. The THSA accomplishes this purpose through its health information exchange (HIE) and privacy and security certification and supporting programs. Learn more about the THSA at <a href="http://www.thsa.org">www.thsa.org</a>.</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/12/19/third-rock-streamlines-securetexas-privacy-and-security-certification/">Third Rock Streamlines SECURETexas Privacy and Security Certification</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4898</post-id>	</item>
		<item>
		<title>CIS SecureSuite member</title>
		<link>https://thirdrock.com/blog/2017/11/20/cis-securesuite-member/</link>
		
		<dc:creator><![CDATA[Kathleen Hadaway]]></dc:creator>
		<pubDate>Mon, 20 Nov 2017 15:30:59 +0000</pubDate>
				<category><![CDATA[Press Release]]></category>
		<category><![CDATA[association]]></category>
		<category><![CDATA[CIS 20]]></category>
		<category><![CDATA[SecureSuite]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8635</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/11/20/cis-securesuite-member/">CIS SecureSuite member</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[

<div class="et_pb_section et_pb_section_9 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2><span>FOR IMMEDIATE RELEASE        </span></h2>
<h2></h2>
<h2><span>THIRD ROCK BECOMES A CIS SECURESUITE MEMBER </span></h2>
<div></div>
<div><span>Austin, Tx, November 20, 2017</span><span> </span><span>&#8212;</span><span> </span><span>Third Rock today announced that it has become a CIS SecureSuite</span><sup>®</sup><span> member. Through this membership, Third Rock is further bolstering its cybersecurity defenses by leveraging CIS SecureSuite resources. The CIS Benchmarks</span><sup>™</sup><span>, the consensus-based, internationally recognized security configuration</span></div>
<div><span>resources, CIS-CAT Pro, and the CIS Controls</span><sup>™</sup><span>, a set of cyber practices developed by global experts, all help to protect an organization against pervasive and dangerous cyber-attacks. </span></div>
<div></div>
<div><span>“We are pleased to add our new CIS SecureSuite membership to our already robust cyber defense toolbox,” said CIO Clint Eschberger. “CIS Benchmarks are recommended as industry-accepted system hardening standards and are used by organizations in meeting compliance requirements for FISMA, PCI, HIPAA, and other security requirements,” he added.</span></div>
<div></div>
<div><span>“We welcome Third rock as a CIS SecureSuite member, and look forward to collaborating with them to help enhance their cybersecurity posture,” said Curtis Dukes, CIS Executive Vice President Security Best Practices &amp; Automation Group.</span></div>
<div></div>
<div><span>CIS’s SecureSuite membership provides members with tools for measuring information security status and resources for making informed security investment decisions. Members include organizations from virtually every industry sector and every size, ranging from independent consultants to Fortune 500 companies. Recent upgrades to CIS’s CIS-CAT Pro tool now provides SecureSuite members a dynamic view into their system’s conformance with the CIS Benchmarks and how it maps to the CIS Controls over time.</span></div>
<div></div>
<div><span>The CIS Benchmarks program is a trusted, independent authority that facilitates the collaboration of public and private industry experts to achieve consensus on practical and actionable solutions. CIS Benchmarks are recommended as industry-accepted system hardening standards and are used by organizations in meeting compliance requirements for Federal Information Security Management Act, PCI, Health Insurance Portability Accountability Act and other security requirements.</span></div></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_10  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><div><span>About CIS</span></div>
<div><span>CIS</span><sup>®</sup><span> (Center for Internet Security, Inc.) is a forward-thinking, non-profit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats. The CIS Controls</span><sup> </sup><span>and CIS Benchmarks</span><sup> </sup><span>are the global standard and recognized best practices for securing IT systems and data against the most pervasive attacks. These proven guidelines are continuously refined and verified by a volunteer, global community of experienced IT professionals. Our CIS Hardened Images</span><span>™</span><span> are virtual machine emulations pre-configured to provide secure, on-demand, and scalable computing environments in the cloud. CIS is home to both the Multi-State Information Sharing and Analysis Center</span><sup>®</sup><span> (MS-ISAC</span><sup>®</sup><span>), the go-to resource for cyber threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial government entities, and the Elections Infrastructure Information Sharing and Analysis Center™ (EI-ISAC™), which supports the cybersecurity needs of U.S. State, Local and Territorial elections offices. </span><span> To learn more, visit </span><a href="https://www.cisecurity.org/" target="_blank" rel="noopener noreferrer">CISecurity.org</a><span> or follow us on Twitter: </span><a href="https://twitter.com/CISecurity" target="_blank" rel="noopener noreferrer">@CISecurity</a><span>.</span></div></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>

<p>The post <a href="https://thirdrock.com/blog/2017/11/20/cis-securesuite-member/">CIS SecureSuite member</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8635</post-id>	</item>
	</channel>
</rss>
