Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
History
Technology
Sports
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/0c/83/45/0c8345e3-7947-72a6-d662-634a05dbac05/mza_2480539896911402896.jpg/600x600bb.jpg
Recklesss Compliance
Max Aulakh
16 episodes
6 hours ago
Send us a text In this episode of the Reckless Compliance podcast, Max talks with Justin Paquette from NtelSec about a bold idea: helping small contractors achieve “CMMC in a day” by working inside a pre-secured enclave—CUI Vault—instead of overhauling their entire enterprise. Justin explains how NtelSec’s government collaboration platform SectorNet (which recently achieved FedRAMP Readiness) informed the commercial offering, and why treating the provider as a cloud service (CSP)—not a manage...
Show more...
Technology
RSS
All content for Recklesss Compliance is the property of Max Aulakh and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text In this episode of the Reckless Compliance podcast, Max talks with Justin Paquette from NtelSec about a bold idea: helping small contractors achieve “CMMC in a day” by working inside a pre-secured enclave—CUI Vault—instead of overhauling their entire enterprise. Justin explains how NtelSec’s government collaboration platform SectorNet (which recently achieved FedRAMP Readiness) informed the commercial offering, and why treating the provider as a cloud service (CSP)—not a manage...
Show more...
Technology
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/0c/83/45/0c8345e3-7947-72a6-d662-634a05dbac05/mza_2480539896911402896.jpg/600x600bb.jpg
Control Inheritance vs. Reciprocity
Recklesss Compliance
12 minutes
1 year ago
Control Inheritance vs. Reciprocity
Send us a text In this episode, Max discusses the fundamental concepts of Control Inheritance and System Reciprocity, highlighting their differences, applications, and importance in the realms of cybersecurity and organizational governance. This topic ties in closely with his recent LinkedIn post about the need for a credit system for security work being done within different parts of the DoD. Topics Covered Control Inheritance:Definition and significance in cybersecurity.Examples of co...
Recklesss Compliance
Send us a text In this episode of the Reckless Compliance podcast, Max talks with Justin Paquette from NtelSec about a bold idea: helping small contractors achieve “CMMC in a day” by working inside a pre-secured enclave—CUI Vault—instead of overhauling their entire enterprise. Justin explains how NtelSec’s government collaboration platform SectorNet (which recently achieved FedRAMP Readiness) informed the commercial offering, and why treating the provider as a cloud service (CSP)—not a manage...