YouTube
LinkedIn
Title Image

White Papers

Platinum is making available the following research White Papers to bridge the gap between theory and practice, providing valuable insights and contributing to progress in the following areas:

Cyber Security:

Government agencies have faced even more assaults, with the US Government cyber-attacks increasing by 57% in the same period. The only government with a more alarming record is the United Kingdom, with an increase of 77%, according to CrowdStrike.
“The Threat Within”

The Threat Within.pdf

The old C&A process was essentially a system audit conducted every three years. Any action taken between the audit periods was at the agency’s discretion. The RMF establishes a lifecycle approach to conducting A&A and monitoring the cybersecurity position continuously.
“Assessments & Authorizations (A&A) as a Necessity”

Assessments & Authorizations (A&A) as a Necessity.pdf

Cybersecurity incidents are inevitable. Even if a system is entirely cloistered, risks from human error and individuals with malicious intent must be addressed. Platinum’s primary objective is to protect the integrity of data systems, both negligent oversights and malicious attacks, while being prepared to mitigate the impact of incidents when they do occur.
The Security Operations Center and Incidence Response.pdf

The Security Operations Center and Incidence Response.pdf

With the creation of the Internet forty years ago, when ARPANET converted to the TCP/IP protocol, the world of computing and communications changed dramatically. In the remarkably short span of just five years, the network’s vulnerability was exposed with the unleashing of the Morris Worm.

Safeguarding the Privacy of Personally Identifiable Information (PII).pdf

Platinum’s staff has worked diligently to make sense of Zero Trust, sometimes-conflicting guidelines and design a practical approach to assisting our clients in enhancing their cybersecurity positions while meeting OMB objectives.

Implementing Zero Trust Architecture (ZTA).pdf

Governance provides the framework for managing the organization and protecting the information technology assets. In addition to defining necessary processes, it identifies who can make decisions, who has the authority to act for the organization, who is accountable, and how people should behave and perform to safeguard sensitive data, mitigate risks, and comply with regulatory requirements.

IT Security Governance A Practical Approach.pdf