IBSS had a blast last night at the 3rd Annual GOVJAM as a proud 'Friend of the Bar' Sponsor! Our team enjoyed an evening full of networking, insightful talks from industry leaders, and rocking out to live bands from the DMV area.? We’re already looking forward to next year’s event! Thanks to everyone who made this night unforgettable. #GovCon #GOVJAM
IBSS
信息技术和服务
Silver Spring,Maryland 4,317 位关注者
Powered by Excellence | Certified B Corporation
关于我们
Since 1992, IBSS, a woman-owned small business, has provided transformational consulting services to the Federal defense, civilian, and commercial sectors. Our services include cybersecurity and enterprise information technology, environmental science and engineering (including oceans, coasts, climate, and weather), and professional management services. Our approach is to serve our employees by investing in their growth and development. As a result, our employees bring greater capabilities and provide an exceptional level of service to our clients. In addition to creating career development opportunities for our employees, IBSS is passionate about giving back to the community and serving the environment. We strive to leave something better behind for the next generation. We measure our success by the positive impact we have on our employees, clients, partners, and the communities we serve. Our tagline, Powered by Excellence, is a recognition of the employees that make up IBSS and ensures we deliver results with quality, applying industry best practices and certifications.
- 网站
-
https://www.ibsscorp.com/
IBSS的外部链接
- 所属行业
- 信息技术和服务
- 规模
- 201-500 人
- 总部
- Silver Spring,Maryland
- 类型
- 私人持股
- 创立
- 1992
- 领域
- Water, Weather, and Climate Science and Engineering、Ocean and Coastal Science Environmental Intelligence 、Data Management and Analytics、System and Software Engineering、Cybersecurity、Enterprise Cloud IT、Management Consulting和Professional Services
地点
-
主要
1110 Bonifant Street
US,Maryland,Silver Spring,20910
IBSS员工
动态
-
Before you sign off for the weekend, sign up for our LinkedIn Live session on Monday with Nijel Redrick! ??? Join us for "How to Develop a System Security Plan (SSP) for NIST SP 800-171 Compliance," where we’ll dive deep into the critical purpose and process of developing a SSP. Whether you're a DoD contractor, subcontractor, or a business looking to strengthen your cybersecurity posture, this session will provide valuable insights into SSP compliance, including practical steps for aligning with NIST SP 800-171 standards. Mark yourself as attending here: https://lnkd.in/eMd7rSjQ #Cybersecurity #NISTSP800171 #Compliance #SSP #IBSSLive
-
We’re thrilled to announce that our team will be attending the 154th American Fisheries Society Annual Meeting in Honolulu from September 15-19! ?? The theme, “Conserving Fishes and Fishing Traditions Through Knowledge Co-Production,” promises stimulating sessions on fisheries conservation and management with experts from across North America, the Pacific Islands, and beyond.? Look out for our awesome team: Forest O'Neill, Ph.D., PMP, Kevin Jeffery, Mark Tagal, and Lisa M. Tagal. If you see us, don’t hesitate to say hello! #AFS2024 #FisheriesConservation #AFSAnnualMeeting
-
Not all insider threats are alike. Some are intentional, while others stem from carelessness or compromised security. Here’s a breakdown: ?? Malicious Insiders: Individuals who deliberately harm the organization, often driven by motives like revenge, financial gain, or espionage. ?? Negligent Insiders: Employees who accidentally expose sensitive data or make careless mistakes, such as clicking phishing links or misplacing confidential information. ?? Compromised Insiders: Insiders whose accounts or credentials have been hijacked by external attackers, enabling unauthorized access without their knowledge. Understanding these types helps us all stay more vigilant. Keep an eye out for behaviors that don’t seem right and always report suspicious activity! Stay aware, stay secure. #InsiderThreats #SecurityAwareness #CyberThreats #DataProtection
-
Mark your calendars for Monday!? Join us on Monday, September 16, at 2:30 p.m. ET for an insightful LinkedIn Live session hosted by our expert, Nijel Redrick! What can you expect to takeaway? > Learn what a System Security Plan (SSP) is and what it should include. > The steps to create your own SSP. > Who you should involve in developing an SSP. > How to write a control implementation statement. ?? Don't miss this opportunity! Sign up here: https://lnkd.in/eMd7rSjQ #Cybersecurity #NISTSP800171 #Compliance #SSP #IBSSLive
How to Develop a System Security Plan for NIST SP 800-171 Compliance | LinkedIn
linkedin.com
-
Today, we remember and honor the lives lost on September 11, 2001. We reflect on the resilience, bravery, and unity that emerged in the face of tragedy #NeverForget
-
IBSS转发了
Join us on Monday, September 16 where we will dive deep into the purpose and process of developing a System Security Plan (SSP). Learn why an SSP is critical for DoD contractors, as outlined by DFARS 252.204-7020 and NIST SP 800-171 requirements, and how it supports business and operational objectives. We break down what an SSP is, what it should include, and the steps to create one. From identifying stakeholders and systems handling Controlled Unclassified Information (CUI) to conducting gap analyses and implementing controls, we provide a comprehensive guide to developing a robust SSP. For more information, email us at [email protected] for a free consultation. #Cybersecurity #SSP #NIST800171 #IBSS #DoD
How to Develop a System Security Plan for NIST SP 800-171 Compliance
www.dhirubhai.net
-
Stay ahead of the game! Check out our latest whitepaper on staying compliant with NIST SP 800-171 for your DoD Contracts. Do not hesitate to reach out with questions regarding your company's specific needs! #DoDContracts #NISTCompliance
-
IBSS转发了
This Week's Cyber Tip Tuesday: Document Your Security Policies Documenting your security policies is a fundamental step in a comprehensive cybersecurity plan. It ensures that everyone in your organization understands how to protect digital assets and what to do in the event of a security incident. These documents should outline acceptable use of systems, responsibilities, and protocols for maintaining security. Regularly reviewing and updating these policies is key to adapting to new threats and keeping your business secure. Join Our Cyber-Savvy Community! Follow for regular updates and protect your business with our expert tips. #CyberTipTuesday #TipTuesday
-
Join us on Monday, September 16, at 2:30 p.m. ET for an exclusive LinkedIn Live session with Nijel Redrick, "How to Develop a System Security Plan for NIST SP 800-171 Compliance"! ??? ?? Mark yourself as attending here: https://lnkd.in/eFCZxUVj #Cybersecurity #NISTSP800171 #Compliance #SSP #IBSSLive
How to Develop a System Security Plan for NIST SP 800-171 Compliance | LinkedIn
linkedin.com