<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Press Release Archives - Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/category/press-release/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/category/press-release/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Wed, 22 Jul 2020 16:15:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>Press Release Archives - Third Rock</title>
	<link>https://thirdrock.com/blog/category/press-release/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>Taylor Hersom added to CompTIA Cybersecurity Advisory Board</title>
		<link>https://thirdrock.com/blog/2020/07/14/taylor-hersom-added-to-comptia-cybersecurity-advisory-board/</link>
		
		<dc:creator><![CDATA[Kathleen Hadaway]]></dc:creator>
		<pubDate>Tue, 14 Jul 2020 18:10:36 +0000</pubDate>
				<category><![CDATA[Press Release]]></category>
		<category><![CDATA[Advisory Board]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[Taylor Hersom]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9293</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/07/14/taylor-hersom-added-to-comptia-cybersecurity-advisory-board/">Taylor Hersom added to CompTIA Cybersecurity Advisory Board</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[

<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Taylor Hersom, Vice President of Business Development for <a href="http://www.cybercompass.co/">CyberCompass®</a> and head of virtual services for Third Rock, has been asked to serve on the very prestigious  <a href="https://www.comptia.org/about-us/advisory-boards/comptia-cybersecurity-advisory-board">CompTIA Cybersecurity Advisory Board (CCAB)</a>. <a href="https://www.comptia.org/">CompTIA</a> is the world&#8217;s leading tech association as well as a thought and action leader. CCAB addresses many of the most pressing cybersecurity concerns facing business and government. The board works to identify opportunities for CompTIA to develop cybersecurity initiatives that advance our nation’s cybersecurity readiness. In addition, the CCAB assesses current CompTIA activities relating to cybersecurity and recommends how to integrate those efforts with other thought leaders on the topic, while also identifying gaps in the cybersecurity ecosystem that CompTIA might consider filling. </p>
<p>Hersom will be working with thought leaders from higher education, legal and cybersecurity fields. The CCAB’s main purpose is to provide a venue where these members can discuss the most critical issues the industry faces, leading to prioritized projects and actionable results. Recently, CompTIA has been actively involved in working with  Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) to maintain critical functions throughout the COVID-19 pandemic (see full article <a href="https://www.comptia.org/newsroom/press-releases/2020/05/11/watch-it-industry-briefing-on-cisa-covid-19-response-efforts">here</a>) as well to providing thought leadership with emerging transformational technologies such as 5G. See all of their latest news and <a href="https://www.comptia.org/newsroom/press-releases">press releases</a>.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>

<p>The post <a href="https://thirdrock.com/blog/2020/07/14/taylor-hersom-added-to-comptia-cybersecurity-advisory-board/">Taylor Hersom added to CompTIA Cybersecurity Advisory Board</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9293</post-id>	</item>
		<item>
		<title>Third Rock welcomes Taylor Hersom in dual roles</title>
		<link>https://thirdrock.com/blog/2020/04/16/third-rock-welcomes-taylor-herson-in-dual-roles/</link>
		
		<dc:creator><![CDATA[Kathleen Hadaway]]></dc:creator>
		<pubDate>Thu, 16 Apr 2020 18:14:41 +0000</pubDate>
				<category><![CDATA[Press Release]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9032</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/04/16/third-rock-welcomes-taylor-herson-in-dual-roles/">Third Rock welcomes Taylor Hersom in dual roles</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[

<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: left;"><img data-recalc-dims="1" fetchpriority="high" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Taylor-bw.png?resize=276%2C300&#038;ssl=1" width="276" height="300" alt="" class="wp-image-9028 aligncenter size-medium" style="float: right;" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/Taylor-bw.png?resize=276%2C300&amp;ssl=1 276w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Taylor-bw.png?w=416&amp;ssl=1 416w" sizes="(max-width: 276px) 100vw, 276px" />Round Rock, TX, April 15, 2020 – Third Rock, a cybersecurity and compliance firm, and creator of CyberCompass® cyber risk management software, is excited to announce the addition of Taylor Hersom to its team to serve in a dual capacity. Mr. Hersom will be heading up CyberCompass® distribution channel development. His specific goal will be to help operationalize channel partners in translating cyber risks to better market their cybersecurity solutions, stated Robert Felps, CEO of Third Rock and CyberCompass® LLC.</p>
<p>Mr. Hersom&#8217;s previous experience was with Deloitte risk management practice. He recently served in helping lead business development for a cybersecurity firm that promoted CyberCompass®. His background provides a unique set of skills in translating how cyber risk management can drive the optimization of cybersecurity and compliance solutions. Mr. Hersom has been using CyberCompass® for over a year with his previous customers. &#8220;Most cyber risk management tools focus on technology, so that leaves companies with a false sense of security and lack of insights into their cyber risk. I have worked with several software applications, and I haven&#8217;t seen anything with the potential and power of CyberCompass® to deliver a complete 360-degree integration across people, processes, technology, and vendors,&#8221; said Hersom.</p>
<p>&#8220;We are excited to add Taylor to our team, especially during this time when businesses need our help in getting higher levels of cybersecurity and compliance quickly,&#8221; stated Felps. &#8220;Taylor brings a depth of knowledge and unique insight to rapidly improve our automation and usability in  assessing cyber risk, managing remediation, and ultimately improving their cyber protection.&#8221;</p>
<p>Hersom has also been tapped to lead Third Rock&#8217;s virtual services growing practice. Third Rock developed CyberCompass® software to provide faster, more complete cybersecurity and compliance at an affordable price. Given the impact on businesses with COVID-19, Third Rock clients are seeking to have virtual Chief Information Security Officer and virtual Chief Compliance Officer expertise as they quickly transition their businesses and improve cybersecurity with a dispersed workforce. &#8220;Having Taylor lead our virtual practice within Third Rock allows him to be involved with understanding client needs as they change and translating those needs to CyberCompass® enhancements,&#8221; stated Felps.</p>
<h4>About Third Rock</h4>
<p>Third Rock is a cyber risk and compliance management professional services firm. Based in Round Rock, Texas, Third Rock services include risk assessments, remediation, and rapid incident response in less 65% less time than other firms. Third Rock built a turnkey, simplified, best in class cyber risk management, cybersecurity and compliance software CyberCompass®.</p>
<h4>About CyberCompass® LLC</h4>
<p>CyberCompass® cloud-based software empowers and enables businesses to manage and monitor their cyber risk at a holistic level. It is the only cyber risk management and compliance software with one assessment to meet multi standards for both cybersecurity and government privacy regulation such as HIPAA, CCPA, and GDPR. The platform includes tools and guidance for hardening an organization&#8217;s IT systems, refining their operational processes, engaging employees with cyber training, and managing vendor compliance. Excess Line Association of New York (ELANY) offers a complimentary subscription to CyberCompass™ for active members to become compliant. CyberCompass®, LLC was recently established as it’s own legal entity.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>

<p>The post <a href="https://thirdrock.com/blog/2020/04/16/third-rock-welcomes-taylor-herson-in-dual-roles/">Third Rock welcomes Taylor Hersom in dual roles</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9032</post-id>	</item>
		<item>
		<title>New enhancement greatly simplify managing cyber risk</title>
		<link>https://thirdrock.com/blog/2019/12/02/new-enhancement-greatly-simplify-managing-cyber-risk/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Mon, 02 Dec 2019 17:13:00 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Press Release]]></category>
		<category><![CDATA[CyberCompass]]></category>
		<category><![CDATA[upgrade]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9349</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/12/02/new-enhancement-greatly-simplify-managing-cyber-risk/">New enhancement greatly simplify managing cyber risk</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2><span>We are pleased to announce six new enhancements that make using CyberCompass® even easier:</span></h2>
<p><span>As a main distributor of CyberCompass®, we are excited for how these new enhancements can help our customers better manage their cyber risk.</span></p>
<p><span></span></p>
<h3><span>Leading edge security</span></h3>
<ul>
<li><span>Added encryption means whether you’re just working in your account, uploading documents or downloading them, all your data is secure.</span></li>
</ul>
<h3><span>Encrypted Attachment Vault:</span><span>You asked, we delivered!</span><span></span></h3>
<ul>
<li><span>Seamless ability to upload multiple attachments with ease</span></li>
<li><span>More confidence while maintaining your required compliance documentation</span></li>
<li><span>Each file is encrypted for greater security</span></li>
<li><span>Electronically store and delete attachments at any time </span></li>
</ul>
<h3><span> </span><span>Expedite User Login</span></h3>
<ul>
<li><span>Token-based authentication for faster repeat logins</span></li>
</ul>
<h3><span> </span><span>New wider viewpoint with </span><span>more</span><span> pixels</span></h3>
<ul>
<li><span>The user view area is now wider on the web page</span></li>
<li><span>Increase the available real-estate on your screen</span></li>
<li><span>See more at one time</span></li>
</ul>
<h3><span> </span><span>New Remediation Issues List Layout</span></h3>
<ul>
<li><span>New redesigned issues layout provides more information at your fingertips. </span></li>
<li><span>Easier to interpret results with new graphs: provides you more information on true state of the issues at a glance</span></li>
<li><span>Updated Issues List provides more details including:</span>
<ul>
<li><span>Threat Rank</span></li>
<li><span>Last Activity</span></li>
<li><span>Assignment information</span></li>
<li><span>Notes Icon</span></li>
</ul>
</li>
<li><span>Simplified filtering to get to your information faster: format and filter to get to the issue that meets your business needs</span></li>
</ul>
<h3><span> </span><span>Issues View now has more flexibility to better manage</span></h3>
<ul>
<li><span>Traverse through issues using the “Previous” and “Next” buttons</span></li>
<li><span>Improved page layout for easier reading and updating.</span></li>
</ul>
<p><span>Are you looking for a solution to provide holistic coverage across your people, processes, technology and vendors? <a href="/contact-us">Contact us</a> today to start your journey toward cyber resilience.</span></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/12/02/new-enhancement-greatly-simplify-managing-cyber-risk/">New enhancement greatly simplify managing cyber risk</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9349</post-id>	</item>
		<item>
		<title>Third Rock now offers NY DFS 500 Risk Assessments</title>
		<link>https://thirdrock.com/blog/2019/06/14/third-rock-now-offers-ny-dfs-500-risk-assessments/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Fri, 14 Jun 2019 12:30:00 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Press Release]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[NY DFS 500]]></category>
		<category><![CDATA[risk assessment]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9342</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/06/14/third-rock-now-offers-ny-dfs-500-risk-assessments/">Third Rock now offers NY DFS 500 Risk Assessments</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Third Rock, powered by <a href="https://cybercompass.co">CyberCompass®</a>, now includes the NYDFS security risk assessment required by all New York financial entities.  The <a href="http://www.dfs.ny.gov/legal/regulations/adoptions/dfsrf500txt.pdf">NYDFS Cybersecurity Regulation</a> (23 NYCRR 500) is “designed to promote the protection of customer information as well as the information technology systems of regulated entities”. This regulation requires each company to conduct a risk assessment and then implement a program with security controls for detecting and responding to cyber events.</p>
<p>The NYDFS has supervisory power over banks, insurance companies, and other financial service companies. More specifically, they supervise the following covered entities:</p>
<ul>
<li>Credit Unions</li>
<li>Health Insurers</li>
<li>Investment Companies</li>
<li>Licensed Lenders</li>
<li>Life Insurance Companies</li>
<li>Mortgage Brokers</li>
<li>Savings and Loans Associations</li>
<li>Private Bankers</li>
<li>Offices of Foreign Banks</li>
<li>Commercial Banks</li>
</ul>
<p>There are some <a href="https://thirdrock.com/blog/2020/01/31/exempt-is-not-a-free-pass-with-23-crr-500-ny-dfs/">exceptions</a> to entities that have to meet the regulations.</p>
<p>NYDFS requires entities to complete the following:</p>
<ul>
<li><strong>Risk Assessments</strong></li>
<li><strong>Audit Trail</strong> including updated policy and procedures</li>
<li><a href="https://www.varonis.com/blog/incident-response-plan/"><strong>Incident Response Plan</strong></a></li>
</ul>
<p>CyberCompass® automates the numerous steps to completing a risk assessment with its on-demand, cloud-base software so a security risk assessment can be completed in 70% less time.  It offers the unique feature to go beyond technology for information security and add the people, process and vendor compliance for information security.  </p>
<p>“We expect what is happening in New York to happen across the country,” stated Robert Felps, CEO.  “We have engineered CyberCompass to help companies meet regulations faster and require less work hours through built-in expertise and automated workflow.”</p>
<p>With Third Rock expertise and guidance, we work with you to use CyberCompass® to increase your compliance and manage your cyber risk.</p>
<table width="667">
<tbody>
<tr>
<td width="157"><strong>Steps necessary to complete Security Risk Assessments</strong></td>
<td width="510"><strong>How CyberCompass® automates workflow to complete a security risk assessment with its built-in expertise.</strong></td>
</tr>
<tr>
<td width="157"><strong>1. <span> </span></strong>Identify threats and vulnerabilities</td>
<td width="510">By answering our online, on demand risk assessment survey.  The questions have been specifically tailored and written in simple language to meet the NYDFS regulations and combined our cyber security risk expertise to assess your employees, processes, technologies and vendors.</td>
</tr>
<tr>
<td width="157"><strong>2. <span> </span></strong>Qualify the extent of the risk</td>
<td width="510">By answering our online, on demand risk assessment survey.  The questions have been specifically tailored and written in simple language to meet the NYDFS regulations and combined our cyber security risk expertise to assess your employees, processes, technologies and vendors.</td>
</tr>
<tr>
<td width="157"><strong>3. <span> </span></strong>Mitigate the risks to reduce them to an agreed and acceptable level</td>
<td width="510">CyberCompass® automatically provides the corrective actions with a step by step guide that helps you  ‘terminate’ the risk by eliminating it entirely, ‘treat’ the risk by applying security controls, ‘transfer’ the risk to a third party, or ‘tolerate’ the risk.</td>
</tr>
<tr>
<td width="157"><strong>4. <span> </span></strong>Update policies and procedures</td>
<td width="510">CyberCompass® has a built-in template to provide you a complete set of policies and procedures.</td>
</tr>
<tr>
<td width="157"><strong>5. <span> </span></strong>Create incident response plan</td>
<td width="510">A unique feature, only CyberCompass® can create the required incident response plan</td>
</tr>
<tr>
<td width="157"><strong>6. <span> </span></strong>Review, monitor and audit.</td>
<td width="510">Utilizing CyberCompass® software subscription and built in notifications, CyberCompass® empowers you to manage cyber risk in one place across the entire organization.</td>
</tr>
</tbody>
</table></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/06/14/third-rock-now-offers-ny-dfs-500-risk-assessments/">Third Rock now offers NY DFS 500 Risk Assessments</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9342</post-id>	</item>
		<item>
		<title>Third Rock welcomes Mike Moran, CISSP, as a Senior Security Advisor</title>
		<link>https://thirdrock.com/blog/2018/08/20/third-rock-welcomes-mike-moran-cissp-as-a-senior-security-advisor/</link>
		
		<dc:creator><![CDATA[Kathleen Hadaway]]></dc:creator>
		<pubDate>Tue, 21 Aug 2018 00:57:13 +0000</pubDate>
				<category><![CDATA[Press Release]]></category>
		<category><![CDATA[Advisory Board]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[security advisory]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5828</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/08/20/third-rock-welcomes-mike-moran-cissp-as-a-senior-security-advisor/">Third Rock welcomes Mike Moran, CISSP, as a Senior Security Advisor</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" decoding="async" class="aligncenter size-full wp-image-5985" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Mike-e1554312626909.jpg?resize=349%2C344&#038;ssl=1" alt="" width="349" height="344" style="float: right;" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/Mike-e1554312626909.jpg?w=349&amp;ssl=1 349w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Mike-e1554312626909.jpg?resize=300%2C296&amp;ssl=1 300w" sizes="(max-width: 349px) 100vw, 349px" /></p>
<p>Round Rock, TX, July 9, 2018 – Third Rock, cyber risk management firm, announces the addition of Mike Moran, CISSP to its Board of Advisors as Senior Security Advisor. Moran is a veteran of the software industry and is focused primarily on applications and development tools, with a secondary focus on high availability, high traffic web sites.   His past projects include architecting and supporting real-time online access to three Olympics and maintaining a healthcare billing system with over 100 million bills per month.</p>
<p>“I’ve known Mike for over 20 years and consider him one of the best database and security experts in the world.” says Robert Felps, Third Rock CEO. “He also has proven experience as a site reliability engineer on high traffic websites with high availability demands, which makes him a great system expert of a broad range of UNIX and Linux systems.”</p>
<p>Moran stated that “Third Rock is advancing cyber risk to deliver a simple, complete set of tools for cyber risk not matched by competitors that clients can easily manage against cyber threats.  I am excited to be part of this innovative team.” He will focus on improving application robustness, tightening security implementations and providing cyber security expertise for Third Rock’s unique software, CyberCompass™.’ He recently completed network and vulnerability scans for a company and discovered several vulnerabilities that had not been uncovered by their IT functions.</p>
<p>Moran is a Certified Information Systems Security Professional, earning his undergraduate degree in Computer Science from Purdue University and his graduate degree in Technology Commercialization from the University of Texas at Austin.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/08/20/third-rock-welcomes-mike-moran-cissp-as-a-senior-security-advisor/">Third Rock welcomes Mike Moran, CISSP, as a Senior Security Advisor</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5828</post-id>	</item>
		<item>
		<title>Third Rock&#8217;s New GDPR Assessment Capabilities Expedite Compliance</title>
		<link>https://thirdrock.com/blog/2018/04/26/third-rocks-new-gdpr-assessment-capabilities-expedite-compliance/</link>
		
		<dc:creator><![CDATA[Kathleen Hadaway]]></dc:creator>
		<pubDate>Thu, 26 Apr 2018 15:00:31 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Press Release]]></category>
		<category><![CDATA[benchmarking]]></category>
		<category><![CDATA[Body of Evidence]]></category>
		<category><![CDATA[corrective actions]]></category>
		<category><![CDATA[Cyber Confidence℠]]></category>
		<category><![CDATA[cyber risk management software]]></category>
		<category><![CDATA[CyberCompass™]]></category>
		<category><![CDATA[GDPR risk assessment]]></category>
		<category><![CDATA[General Data Protection Regulation Risk Assessment]]></category>
		<category><![CDATA[HIPAA Security Risk Assessment]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[SECURETexas]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[vulnerability scans]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5491</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/04/26/third-rocks-new-gdpr-assessment-capabilities-expedite-compliance/">Third Rock&#8217;s New GDPR Assessment Capabilities Expedite Compliance</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: center;"></p>
<p><strong><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5522 size-medium" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?resize=300%2C214&#038;ssl=1" alt="" width="300" height="214" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?resize=300%2C214&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?resize=768%2C549&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?resize=1024%2C731&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?w=2160&amp;ssl=1 2160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?w=3240&amp;ssl=1 3240w" sizes="(max-width: 300px) 100vw, 300px" /></strong></p>
<h2 style="text-align: center;"><span style="font-size: 12px;"><strong><em>More than half of companies impacted by GDPR are not ready for May 25<sup>th</sup> deadline</em></strong></span></h2>
<p><strong>Round Rock, TX – April 26, 2018</strong> – Third Rock, a supplier of cyber risk management software, announced today the launch of its General Data Protection Regulation (GDPR) Risk Assessment, the newest enhancement to its cyber risk management software to help companies become GDPR compliant before the May 25, 2018 deadline set by the European Union (EU).</p>
<p>GDPR applies to every company that collects, processes or stores an EU citizen’s data, regardless of sector, size and geographical location. The consulting firm <a href="https://www.gartner.com/newsroom/id/3701117">Gartner</a> estimates that more than half of the companies that are subject to the GDPR will not be in compliance this year and will be at risk for fines by the EU. A risk assessment is a required action to meet GDPR compliance regulations for protecting EU citizens’ data.</p>
<p>The full integration of the GDPR assessment into Third Rock’s current web based cyber risk management software platform, <a href="http://www.compassdb.io">CyberCompass™</a>, allows companies to quickly complete the assessment and then automatically generate a prioritized corrective action plan.  Robert Felps, CEO of Third Rock, explained, “This software provides rapid benchmarking of an organization’s compliance status, prioritizes needed corrective actions, and maintains the Body of Evidence in the event of an audit by regulatory authorities.  Companies can then choose to implement the corrective actions themselves, collaborate with Third Rock, or engage their current compliance consulting firm. Most companies can achieve GDPR compliance in approximately two to twelve weeks.”</p>
<p>Third Rock’s CyberCompass™ GDPR Risk Assessment provides a comprehensive, user-friendly experience. Most companies use a mix of forms and spreadsheets to manage cyber risk. Natan Bradbury, CEO of <a href="http://www.vitechpros.com">VITECH Pros </a>who partnered with Third Rock to test the new assessment stated, &#8220;You don&#8217;t know how long I&#8217;ve been looking for an application like this!  I&#8217;ve been cobbling together Excel and Word documents and some other tools to complete assessments.”  CyberCompass™ has been documented to achieve 65% time savings compared to other assessment approaches.</p>
<p><strong> </strong><strong style="font-size: 12px;">About Third Rock</strong></p>
<p>Third Rock specializes in simplifying cyber risk management to enable organizations to holistically assess and manage their cyber risk by engaging employees, refining processes, and hardening technical systems, creating a culture of Cyber Confidence℠. Third Rock’s CyberCompass™ software includes: HIPAA, GDPR, NIST SP 800-171, and <a href="http://www.thsa.org">SECURETexas</a> assessments, along with comprehensive workstation and network vulnerability scans. Third Rock is proud to partner with <a href="http://www.tmlt.org">Texas Medical Liability Trust</a> and Texas Health Services Authority. Learn more at <a href="http://www.thirdrock.com#www.thirdrock.com">ThirdRock.com</a>.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/04/26/third-rocks-new-gdpr-assessment-capabilities-expedite-compliance/">Third Rock&#8217;s New GDPR Assessment Capabilities Expedite Compliance</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5491</post-id>	</item>
		<item>
		<title>Third Rock Enhances SECURETexas Capabilities</title>
		<link>https://thirdrock.com/blog/2018/03/21/third-rock-enhances-securetexas-capabilities/</link>
		
		<dc:creator><![CDATA[Kathleen Hadaway]]></dc:creator>
		<pubDate>Wed, 21 Mar 2018 15:00:48 +0000</pubDate>
				<category><![CDATA[Press Release]]></category>
		<category><![CDATA[annual security risk assessment]]></category>
		<category><![CDATA[automated risk management process]]></category>
		<category><![CDATA[collaboration tools]]></category>
		<category><![CDATA[CompassDB]]></category>
		<category><![CDATA[cyber risk]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[prioritized corrective action list]]></category>
		<category><![CDATA[prioritized risk management plan]]></category>
		<category><![CDATA[reference library]]></category>
		<category><![CDATA[SECURETexas]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[THSA]]></category>
		<category><![CDATA[user training]]></category>
		<category><![CDATA[vendor management]]></category>
		<category><![CDATA[vulnerability and compliance scanning tool]]></category>
		<category><![CDATA[workforce compliance training]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5246</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/03/21/third-rock-enhances-securetexas-capabilities/">Third Rock Enhances SECURETexas Capabilities</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: center;"><strong>Third Rock Enhances SECURETexas Capabilities</strong></p>
<p style="text-align: center;"><em>Customized to over 20 types of healthcare specialties for better</em></p>
<p style="text-align: center;"><em>protection of patient information against cyber threats</em><em> </em></p>
<em> </em>

<strong>Austin, TX – March 21, 2018</strong> – Third Rock, a preferred vendor for Texas Health Services Authority (THSA), has further simplified the SECURETexas certification process by offering a unique customized security risk assessment approach based on an organization’s practice area.

Third Rock has customized its web-based security risk assessment tool for more than 20 different healthcare practice types, including urology, pediatrics, orthopedics, urgent care, primary care, optometry, dentistry, and home health, saving users’ time by assessing only those issues pertinent to that practice type.  No other vendor offers this level of automated customization for the SECURETexas certification program.

The SECURETexas certification program is included in <a href="https://www.compassdb.io/">Third Rock’s CompassDB</a><strong>™</strong><sup> </sup>cyber risk management platform. Third Rock has shown that organizations can realize a 66% reduction in work hours by utilizing Third Rock’s Compass DB<strong>™</strong> software compared to other labor-intensive security risk assessment approaches.  Third Rock’s CompassDB<strong>™</strong> reduces the complexity of assessing and managing cyber security and compliance, especially for smaller and medium size health organizations that are most vulnerable to cyber attacks.

“Healthcare organizations are highly-targeted by cyber threats yet have the lowest utilization of risk management software to help manage their risks.  With cyber security now an urgent issue for all healthcare entities, our goal is to make protecting patient information easy and intuitive with a one-stop solution,“ stated Ed Jones, Third Rock’s Chief Compliance Officer.

<img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5252" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/SECURETexas_Preferred_Vendor_Button.png?resize=184%2C102&#038;ssl=1" alt="SECURETexas Preferred Vendor stamp of approval" width="184" height="102" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/SECURETexas_Preferred_Vendor_Button.png?resize=300%2C166&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/SECURETexas_Preferred_Vendor_Button.png?resize=768%2C426&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/SECURETexas_Preferred_Vendor_Button.png?resize=1024%2C568&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/SECURETexas_Preferred_Vendor_Button.png?w=2160&amp;ssl=1 2160w" sizes="(max-width: 184px) 100vw, 184px" />Additional focused and customizable surveys have been programmed into Compass DB<strong>™</strong><sup> </sup>to meet the comprehensive SECURETexas requirements.  These surveys are fully integrated into the Compass DB<strong>™</strong><sup> </sup>platform and provide direct references and links to Texas regulations. Completion of the SECURETexas assessment in Compass DB<strong>™</strong> automatically generates a prioritized risk management plan, including the corrective actions required, along with policies and procedures, user training, vendor management, a reference library and extensive collaboration tools.

Completing an annual security risk assessment is a requirement for meeting federal HIPAA compliance regulations, while SECURETexas ensures Texas’ privacy and information protection requirements are met. SECURETexas certification can be a mitigating factor when a court or state licensure agency imposes a penalty for violation of the Texas Medical Records Privacy Act.

<strong>About Third Rock</strong>

Based in Round Rock, Texas, Third Rock is a cyber risk and compliance management firm.  Third Rock has built a turnkey, simplified software platform, <a href="http://www.compassdb.io">CompassDB</a><strong>™</strong><sup> </sup>to give organizations the ability to manage and monitor their cyber risk at a holistic level. The platform includes tools and guidance for hardening an organization’s IT systems, refining their processes, and engaging employees to create a culture of Cyber Confidence. Third Rock is the only firm to include a comprehensive compliance and vulnerability scan of an organization’s computers with their SECURETexas assessments. Learn more at <a href="http://www.thirdrock.com#www.thirdrock.com">ThirdRock.com</a>.<strong> </strong>

<strong>About THSA</strong>

The Texas Health Services Authority (THSA) was established by the Texas Legislature for the purpose of promoting, implementing, and facilitating the secure electronic exchange of health information. The THSA accomplishes this purpose through its health information exchange (HIE) and privacy and security certification and supporting programs. Learn more about the THSA at <a href="http://www.thsa.org">www.thsa.org</a>.</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/03/21/third-rock-enhances-securetexas-capabilities/">Third Rock Enhances SECURETexas Capabilities</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5246</post-id>	</item>
		<item>
		<title>Third Rock Streamlines SECURETexas Privacy and Security Certification</title>
		<link>https://thirdrock.com/blog/2017/12/19/third-rock-streamlines-securetexas-privacy-and-security-certification/</link>
		
		<dc:creator><![CDATA[Kathleen Hadaway]]></dc:creator>
		<pubDate>Tue, 19 Dec 2017 15:00:42 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Press Release]]></category>
		<category><![CDATA[automated risk management process]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[maintained policies and procedures]]></category>
		<category><![CDATA[SECURETexas]]></category>
		<category><![CDATA[THSA]]></category>
		<category><![CDATA[vulnerability and compliance scanning tool]]></category>
		<category><![CDATA[workforce compliance training]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4898</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/12/19/third-rock-streamlines-securetexas-privacy-and-security-certification/">Third Rock Streamlines SECURETexas Privacy and Security Certification</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><strong>Round Rock, TX – December 19, 2017</strong> – Third Rock, who was awarded preferred vendor status with Texas Health Services Authority (THSA) in August this year, has streamlined the SECURETexas certification process to help healthcare organizations reduce liability by better securing patients’ Protected Health Information (PHI).

Third Rock has incorporated the question set for the SECURETexas certification program into&nbsp;<a href="https://www.compassdb.io/">CompassDB</a>, Third Rock&#8217;s compliance management system. &nbsp;Third Rock has shown that by utilizing CompassDB, organizations can reduce man-hours for performing and reporting a security risk assessment by up to 66%, compared to other security risk assessment tools and methods.

“We understand that most healthcare practices want to improve their cybersecurity, but don’t have the expertise or time to perform a comprehensive risk assessment.&nbsp; Our goal is to make protecting patient information easy and affordable as cyber threats in healthcare continue to increase,“ stated Ed Jones, Third Rock’s Chief Compliance Officer.

The SECURETexas certification is available for covered entities and business associates operating in Texas that are subject to privacy and security regulations. Certification involves engaging a SECURETexas Preferred Vendor, such as Third Rock, to assess&nbsp;the covered entity’s compliance&nbsp;against the SECURETexas privacy and security&nbsp;<a href="http://texreg.sos.state.tx.us/public/readtac$ext.TacPage?sl=R&amp;app=9&amp;p_dir=&amp;p_rloc=&amp;p_tloc=&amp;p_ploc=&amp;pg=1&amp;p_tac=&amp;ti=1&amp;pt=15&amp;ch=390&amp;rl=2">standards</a>, then&nbsp;remediating any identified&nbsp;deficiencies.&nbsp; SECURETexas certification can be a mitigating factor when a court or state licensure agency imposes a penalty for violation of the Texas Medical Records Privacy Act.

Third Rock’s CompassDB software is a comprehensive cloud-based Compliance Management Platform that makes managing cybersecurity and compliance easier and less costly, especially for smaller and medium size healthcare organizations that are most vulnerable to cyber attacks. This tool will help healthcare entities attain SECURETexas Certification, as well as meet HIPAA compliance requirements, with capabilities that include an automated risk management process, vulnerability and compliance scanning tool, workforce compliance training, and continually updated policies and procedures.

&nbsp;

<strong>About Third Rock</strong>

Third Rock is a cybersecurity and compliance firm based in Round Rock, Texas whose purpose is to help businesses protect their customers’ information. Third Rock offers a unique turnkey, simplified approach to cybersecurity and compliance that engages employees, refines processes, and updates technology to move organizations to a culture of compliance and protection. Learn more at <a href="http://www.thirdrock.com">ThirdRock.com</a>.

<strong>About THSA</strong>

The Texas Health Services Authority (THSA) was established by the Texas Legislature for the purpose of promoting, implementing, and facilitating the secure electronic exchange of health information. The THSA accomplishes this purpose through its health information exchange (HIE) and privacy and security certification and supporting programs. Learn more about the THSA at <a href="http://www.thsa.org">www.thsa.org</a>.</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/12/19/third-rock-streamlines-securetexas-privacy-and-security-certification/">Third Rock Streamlines SECURETexas Privacy and Security Certification</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4898</post-id>	</item>
		<item>
		<title>CIS SecureSuite member</title>
		<link>https://thirdrock.com/blog/2017/11/20/cis-securesuite-member/</link>
		
		<dc:creator><![CDATA[Kathleen Hadaway]]></dc:creator>
		<pubDate>Mon, 20 Nov 2017 15:30:59 +0000</pubDate>
				<category><![CDATA[Press Release]]></category>
		<category><![CDATA[association]]></category>
		<category><![CDATA[CIS 20]]></category>
		<category><![CDATA[SecureSuite]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8635</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/11/20/cis-securesuite-member/">CIS SecureSuite member</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[

<div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2><span>FOR IMMEDIATE RELEASE        </span></h2>
<h2></h2>
<h2><span>THIRD ROCK BECOMES A CIS SECURESUITE MEMBER </span></h2>
<div></div>
<div><span>Austin, Tx, November 20, 2017</span><span> </span><span>&#8212;</span><span> </span><span>Third Rock today announced that it has become a CIS SecureSuite</span><sup>®</sup><span> member. Through this membership, Third Rock is further bolstering its cybersecurity defenses by leveraging CIS SecureSuite resources. The CIS Benchmarks</span><sup>™</sup><span>, the consensus-based, internationally recognized security configuration</span></div>
<div><span>resources, CIS-CAT Pro, and the CIS Controls</span><sup>™</sup><span>, a set of cyber practices developed by global experts, all help to protect an organization against pervasive and dangerous cyber-attacks. </span></div>
<div></div>
<div><span>“We are pleased to add our new CIS SecureSuite membership to our already robust cyber defense toolbox,” said CIO Clint Eschberger. “CIS Benchmarks are recommended as industry-accepted system hardening standards and are used by organizations in meeting compliance requirements for FISMA, PCI, HIPAA, and other security requirements,” he added.</span></div>
<div></div>
<div><span>“We welcome Third rock as a CIS SecureSuite member, and look forward to collaborating with them to help enhance their cybersecurity posture,” said Curtis Dukes, CIS Executive Vice President Security Best Practices &amp; Automation Group.</span></div>
<div></div>
<div><span>CIS’s SecureSuite membership provides members with tools for measuring information security status and resources for making informed security investment decisions. Members include organizations from virtually every industry sector and every size, ranging from independent consultants to Fortune 500 companies. Recent upgrades to CIS’s CIS-CAT Pro tool now provides SecureSuite members a dynamic view into their system’s conformance with the CIS Benchmarks and how it maps to the CIS Controls over time.</span></div>
<div></div>
<div><span>The CIS Benchmarks program is a trusted, independent authority that facilitates the collaboration of public and private industry experts to achieve consensus on practical and actionable solutions. CIS Benchmarks are recommended as industry-accepted system hardening standards and are used by organizations in meeting compliance requirements for Federal Information Security Management Act, PCI, Health Insurance Portability Accountability Act and other security requirements.</span></div></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><div><span>About CIS</span></div>
<div><span>CIS</span><sup>®</sup><span> (Center for Internet Security, Inc.) is a forward-thinking, non-profit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats. The CIS Controls</span><sup> </sup><span>and CIS Benchmarks</span><sup> </sup><span>are the global standard and recognized best practices for securing IT systems and data against the most pervasive attacks. These proven guidelines are continuously refined and verified by a volunteer, global community of experienced IT professionals. Our CIS Hardened Images</span><span>™</span><span> are virtual machine emulations pre-configured to provide secure, on-demand, and scalable computing environments in the cloud. CIS is home to both the Multi-State Information Sharing and Analysis Center</span><sup>®</sup><span> (MS-ISAC</span><sup>®</sup><span>), the go-to resource for cyber threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial government entities, and the Elections Infrastructure Information Sharing and Analysis Center™ (EI-ISAC™), which supports the cybersecurity needs of U.S. State, Local and Territorial elections offices. </span><span> To learn more, visit </span><a href="https://www.cisecurity.org/" target="_blank" rel="noopener noreferrer">CISecurity.org</a><span> or follow us on Twitter: </span><a href="https://twitter.com/CISecurity" target="_blank" rel="noopener noreferrer">@CISecurity</a><span>.</span></div></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>

<p>The post <a href="https://thirdrock.com/blog/2017/11/20/cis-securesuite-member/">CIS SecureSuite member</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8635</post-id>	</item>
		<item>
		<title>Third Rock Welcomes Timothy Sullivan to its Board of Advisors</title>
		<link>https://thirdrock.com/blog/2017/09/21/third-rock-welcomes-timothy-sullivan-to-its-board-of-advisors/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 21 Sep 2017 09:00:48 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Press Release]]></category>
		<category><![CDATA[Advisory Board]]></category>
		<category><![CDATA[development]]></category>
		<category><![CDATA[execution]]></category>
		<category><![CDATA[Senior Strategic Advisor]]></category>
		<category><![CDATA[strategic planning]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4378</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/09/21/third-rock-welcomes-timothy-sullivan-to-its-board-of-advisors/">Third Rock Welcomes Timothy Sullivan to its Board of Advisors</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_9 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_10  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-4227" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/timothy_sullivan-970.jpg?resize=160%2C168&#038;ssl=1" alt="" width="160" height="168" />Round Rock, TX,  September 21, 2017 – Third Rock, a compliance management software and consulting firm, announces the addition of Timothy Sullivan to its Board of Advisors. As a technology innovator and entrepreneur spanning four decades, Mr. Sullivan has created constructive disruptive technologies, products and services. He has grown more than a half-dozen companies in several industry sectors including software, medical devices, and biotech. Three of these companies were acquired by major corporations.

Mr. Sullivan holds undergraduate and graduate degrees in Business, Physics, and Strategic Foresight from the University of Wisconsin-Oshkosh and the University of Houston. He joins Third Rock as the Senior Strategic Advisor with responsibility for strategic planning, development, and execution.

“I’ve known Timothy for over 20 years and consider him one of the best business advisors in the country.” says Robert Felps, Third Rock CEO. “His experience and success in growing numerous companies in several industries and his board level involvement with the UT/Dell Medical School, BioAustin, and Austin Technology Council make him a great choice to guide our strategic development and execution at Third Rock. Plus, his passion to protect the quality of life makes him a perfect fit. We’re excited to have him join our team.”

Mr. Sullivan asserted, “The CompassDB technology is a wonderful example of what happens when an experienced and motivated product development team applies creativity and innovation to solve real world problems. Third Rock’s cybersecurity and compliance products set a new benchmark that will enable both small and large medical service providers to defend their business operations against cyber threats and maintain compliance with government standards.&#8221; He continued, &#8220;I am honored to join the Third Rock executive team to help craft and execute the commercialization strategy for the many cybersecurity and compliance products that will flow from the CompassDB technology platform.”

About Third Rock Services

<strong>Third Rock</strong> is a thought leader on HIPAA compliance and cybersecurity.  Powered by <strong>CompassDB<sup>™</sup></strong>, a compliance management platform, Third Rock makes HIPAA compliance simple, easy, and affordable for healthcare organizations and their business associates. Their complete HIPAA solution includes everything an organization needs to become HIPAA compliant as well as easy-to-follow guidance for improving its cybersecurity. For more information, please visit <a href="https://thirdrock.com/about/"><strong>thirdrock.com</strong></a>.</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/09/21/third-rock-welcomes-timothy-sullivan-to-its-board-of-advisors/">Third Rock Welcomes Timothy Sullivan to its Board of Advisors</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4378</post-id>	</item>
	</channel>
</rss>
