How to protect controlled unclassified information

WWT offers a comprehensive assessment that provides a formal approach to determining how well an organization is aligned to compliance as defined by the federal standard Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations (NIST 800-171). With a deadline of December 31, 2017, rapidly approaching, organizations need to align compliance activities to address potential gaps in a rapid and efficient manner. The WWT assessment team identifies NIST requirements that pertain to the business; analyzes current operations supporting the standard; and provides a report of sufficiency of current efforts and recommendations for NIST alignment. The report audience includes executives, business unit owners and operational managers.

Objectives

Assessment objectives include:

  • An evaluation of NIST 800-171 compliance requirements per the tailoring criteria provided in the standard
  • An assessment of implemented technologies and operational processes as they pertain to the NIST 800-171 standard
  • Determination if potential gaps exist between NIST requirements and operational processes and technologies within the organization
  • A summary of the overall maturity level of NIST 800-171 compliance alignment
  • If compliance gaps exist, detailed recommendations are provided for remediation and alignment to the NIST 800-171 controls

The approach used for this assessment, which includes a clearly defined methodology and set of deliverables, provides a standardized and repeatable framework for periodic reassessment of compliance progress and program maturity. Recommendations are created according to business needs and resource availability, leveraging current technologies and program management capabilities within the business environment to achieve compliance.

Benefits

The WWT NIST 800-171 Compliance Assessment allows our customers to gain a comprehensive understanding of their compliance requirements and potential gaps between current operations and the NIST standard. Our team aligns potential control gap recommendations to the needs and capabilities within our customers’ business environments. This allows a simplified and clear path to achieving compliance in the shortest time possible.

View our NIST 800-171 Compliance Assessment brochure.

Request this workshop today!

Additional Resources

  • Splunk Appliance Brochure

    Through operational intelligence, Splunk helps organizations detect potential problems and decrease response time to meet DCOI compliance.
  • Identity and Access Management

    Organizations understand that providing users with secure access can be challenging and strenuous. Identity and Access Management (IAM) is an enterprise program that focuses on ensuring that authorized people and devices have the appropriate access at the right time.
  • HIPAA Security Assessment

    This assessment presents an organization with actionable data to strengthen areas, mature processes, bring attention to compliance issues, and provide recommendations for remediation efforts.
  • SOC Assessment

    WWT's Security Operations Center (SOC) Assessment will assess each of the foundation-level elements of people, process, and technology to identify your organization’s overall strengths and weaknesses, current maturity ratings, and provide recommendations for improvement.
  • Issues in Cloud Security

    This white paper discusses the major computer security issues confronting an organization when moving to the cloud.
  • Windows 10 Migrations Made Easy

    Ensure seamless migrations to Windows 10 with WWT and Tanium™. Together, WWT and Tanium deliver the integrated tools and demonstrated expertise to optimize security, enable zero-touch migration and reduce risk and complexity.
  • Security Assessment

    WWT’s comprehensive security assessments allow organizations to gain a comprehensive understanding of their security program maturity and walk away with prescriptive recommendations to mitigate identified risks or control gaps.
  • Vulnerability Management Program

    With limited resources to defend against attackers, IT and security organizations need an efficient vulnerability management approach to protect their systems. This service provides organizations a comprehensive vulnerability management program that is effective and aligned to business needs.
  • RADAR White Paper

    Understand how the RADAR cybersecurity methodology is applied to deliver a better understanding of your security posture, total visibility into the threat landscape, optimized defensive capabilities, advanced detection capabilities and best practices for adaptive learning and response.
  • RADAR Methodology

    Readiness, Awareness, Defense, Analytics and Response. These elements define our cybersecurity methodology, RADAR, and can be applied to organizations of any size.
  • CARA Overview

    The integration of an enterprise security methodology with a cybersecurity analytics reference architecture (CARA) provides a comprehensive solution to cyber protection and threat defense challenges
  • WWT Security Practice

    Explore WWT's approach to defending against cyber threats.