Continuous Authorization to Operate (cATO) Working Group

Due to growing cybersecurity infrastructure and increasingly sophisticated cybersecurity threats, continuous monitoring of information security systems through automation is the best way to accurately assess vulnerability across a complex threat landscape. However, continuous monitoring of information security systems has several challenges to address, including technology, governance, controls evolution, data models, standardized frameworks, data sharing, and auditor evolution, just to name a few.

 

Learn what experts, thought leaders, and government executives shared about their thoughts about cybersecurity audit automation, at this recent ATARC-hosted Working Group kick-off Roundtable:

White Paper: Cybersecurity Audit Automation
Nita Jones-Coleman

Nita Jones-Coleman

Government Vice Chair

Department of Veterans Affairs

Brian Hajost

Brian Hajost

Industry Vice Chair

SteelCloud

Elizabeth Wyckoff

Elizabeth Wyckoff

Program Manager

ATARC