614-322-2222 or 877-770-8324

TechR2 serves on the Ohio Cybersecurity Collaboration Committee (OC3), works with US critical infrastructure organizations, and maintains the highest cybersecurity standards themselves.

Sep

8

TechR2 serves on the Ohio Cybersecurity Collaboration Committee (OC3), works with US critical infrastructure organizations, and maintains the highest cybersecurity standards themselves.

If you are into cyber, this message is for you. Yesterday, CISA released the Zero Trust Maturity Model for public comment beginning Tuesday, September 7, 2021, and concludes on Friday, October 1, 2021. CISA is interested in gathering feedback focused on the following key questions. Has this document been helpful to your agency as you prepared your Cyber Executive Order zero trust implementation plan? If not, what guidance could be added?

Does your agency have suggestions on how better to delineate the 5 pillars from the 3 crosscutting capabilities—Visibility and Analytics, Automation and Orchestration, and Governance? Which pillars do you think are the best defined and which pillars need help? How could the Zero Trust Maturity Model better support your agency’s Cyber Executive Order zero trust implementation plan?

TechR2 serves on the Ohio Cybersecurity Collaboration Committee (OC3), works with US critical infrastructure organizations, and maintains the highest cybersecurity standards themselves. Why? When you read about the many cybersecurity breaches in your community, it is partners like TechR2 that are making a difference.



  • Providing complete “Cradle to Grave” data eradication solutions, sound experience, industry best practices and resources to support you.


    Why risk it? Get started today! Call 614-322-2222


  • About An Industry Leader

    TechR2 is the only company in the industry that has earned a US patent for its Track-Contain-Destroy-Verify data security process, is OEM approved, upholds critical ISO certifications, and is recognized for compliance with GDPR, NIST and all governmental regulations concerning data destruction, including ISO 27001, ISO 14001, ISO 9001, and ISO 45001.