Gain the edge in Cyber.
Grow your talent.
Cyber in the News
24 Apr 10 - If you ever wondered why the new supply chain security controls are important - check out this article on the Home Depot breach by a 3rd party vendor. SC Magazine - Home Depot
Coming Soon
New blog. The 5 best brown bag series topics for your cybersecurity team.
Training
No time to train your cybersecurity professionals.? Let us do it for you. In less than two hours, we’ll train your ISSOs and SCAs on the 5 core skills they need. Check out our two hands-on courses on Udemy. Subscription plans are available.
About Cyber Code Lab
We are a cyber security firm committed to developing the tools and talent needed to manage the constantly evolving cyber threat landscape.
To enhance your Organizations cyber capabilities, we offer the following services:
Security Assessments - RMF, NIST, FedRAMP, CIS,
Security Audit Preparation - Internal, External (e.g. OMB)
Technical Writing and Documentation
Professional Development and Training
CCL cyber professionals have more than 20 years of information system security experience at the - application/software - OS/platform - network/infrastructure levels and we welcome the opportunity to serve as members of your team.
Tools
Our current tools were created to address the increasing demand for cyber security professionals. By streamlining the path to becoming a cyber security professional, our tools allow your Organization to gain the cyber edge with a more knowledgeable cyber team.
Our first Blog Series - ‘What’s New in NIST?: Transition from Rev 4 to Rev 5 - we get up close and personal with the Rev 5 security & privacy control families in our FREE 2 minute videos. Each video features an overview of the control family, followed by changes from Rev 4 to Rev 5 and concludes by highlighting a few of the controls. So whether you’re an Analyst/ISSO/Assessor with little time to read all three Rev5 artifacts - (800-53, 800-53B and 800-53A) or new pro who needs to learn NIST fundamentals ASAP, you’ll be up to speed in no time.
Part 20 - Systems Information and Integrity (SI)
Part 19 - Systems and Communication Protection(SC)
Part 18 - System and Service Acquisition (SA)
Part 17 - Risk Assessment (RA)
Part 16 - Personnel Security (PS)
Part 15 - Program Management (PM)
Part 14 - Planning (PL)
Part 13 - Physical and Environmental (PE)
Part 12 - Media Protection (MP)
Part 11 - Maintenance (MA)
Part 10 - Incident Response (IR)
Part 8 - Contingency Planning (CP)
Part 7 - Configuration Management (CM)
Part 5 - Awareness & Training (AT)
Part 4 - Audit and Accountability (AU)
Part 3 - Access Control (AC)
Part 2 - PII Privacy and Transparency (PT)
Contact
Feel free to contact us with any questions.