<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Risk Management Framework &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/risk-management-framework/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:50:25 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>Risk Management Framework &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Continual Modernization is the Key to Risk Management</title>
		<link>https://www.steelcloud.com/continual-modernization-is-the-key-to-risk-management/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 14 Nov 2022 20:08:02 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[cybersecurity transformation]]></category>
		<category><![CDATA[modernization]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=87679</guid>

					<description><![CDATA[Compliance is a road to RMF, but it’s only part of the entire road therefore continual modernization is crucial. Technology modernization seems to be on everyone’s lips (and weighing heavily on everyone’s minds) these days. The good news is that once it’s done, you won’t have to think about it again until the next push ...]]></description>
		
		
		
			</item>
		<item>
		<title>Transforming Your Cybersecurity Mindset</title>
		<link>https://www.steelcloud.com/transforming-your-cybersecurity-mindset/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 07 Nov 2022 19:11:47 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[cybersecurity transformation]]></category>
		<category><![CDATA[NIST Cybersecurity Framework CSF 2.0]]></category>
		<category><![CDATA[OT/IT]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=87664</guid>

					<description><![CDATA[Solutions for today&#8217;s Cybersecurity transformation. Transformation may be the most overused word in technology. When it comes to cybersecurity transformation, the intended outcome is to rapidly reduce cyber risk and utilize new digital technologies that support your strategic goals. However, investing in digitalization without shoring up cybersecurity practices is as misguided as building a car without ...]]></description>
		
		
		
			</item>
		<item>
		<title>Standardize, Automate, and Reduce the Complexity of Cybersecurity</title>
		<link>https://www.steelcloud.com/standardize-automate-and-reduce-the-complexity-of-cybersecurity/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 31 Oct 2022 17:17:40 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[cisa]]></category>
		<category><![CDATA[FISMA]]></category>
		<category><![CDATA[information technology]]></category>
		<category><![CDATA[NIST Cybersecurity Framework CSF 2.0]]></category>
		<category><![CDATA[operational technology]]></category>
		<category><![CDATA[OT]]></category>
		<category><![CDATA[OT highly regulated industries]]></category>
		<category><![CDATA[regulations impacting OT]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=87635</guid>

					<description><![CDATA[Journey to NIST Cybersecurity framework (CSF) 2.0 workshop kicked off recently. The framework, first published in 2014, is widely accepted as the foundation for cybersecurity and technology. However, quite a bit has changed in the last nine years, including a global pandemic, and not surprising that the CFS has endured. NIST has been seeking feedback ...]]></description>
		
		
		
			</item>
		<item>
		<title>CBOM: Automating Zero-Defect Compliance at Scale</title>
		<link>https://www.steelcloud.com/cbom-automating-zero-defect-compliance-at-scale/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 24 Oct 2022 20:23:13 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Webinars]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[automated compliance]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[CBOM]]></category>
		<category><![CDATA[Compliance Bill of Materials]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Disa STIG]]></category>
		<category><![CDATA[DLT]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[drift]]></category>
		<category><![CDATA[enterprise infrastructure]]></category>
		<category><![CDATA[explicit compliance]]></category>
		<category><![CDATA[Implicit compliance]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[software bill of materials]]></category>
		<category><![CDATA[splunk dashboards]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=87588</guid>

					<description><![CDATA[In today’s complex digital technology landscape there is an ever-evolving threat that requires securing and protecting critical infrastructure, information, and assets.  Several initiatives are under way throughout the Government to support the presidential Executive Order on Improving the Nation’s Cybersecurity which includes implementing a zero-trust framework and providing greater visibility into application vulnerabilities through the ...]]></description>
		
		
		
			</item>
		<item>
		<title>From CISO to SME – Make Your Compliance Data Work for Your Organization</title>
		<link>https://www.steelcloud.com/from-ciso-to-sme-make-your-compliance-data-work-for-your-organization/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 19 Jul 2022 19:27:23 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Webinars]]></category>
		<category><![CDATA[ATO]]></category>
		<category><![CDATA[automated compliance]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[compliance dashboards]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Disa STIG]]></category>
		<category><![CDATA[DLT]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[drift]]></category>
		<category><![CDATA[enterprise infrastructure]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[splunk dashboards]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=87016</guid>

					<description><![CDATA[This webcast will share with you everything you want to know about making your compliance data for Work for your organization. Maintaining risk awareness, performing compliance trend analysis, and discovering and correcting endpoint compliance drift is characteristically a cumbersome, time-consuming manual process. An enterprise that remediates thousands of endpoints a day generates millions of data ...]]></description>
		
		
		<enclosure url="https://www.steelcloud.com/wp-content/uploads/SteelCloud-Webinar-Recording-with-DLT-Logo_reduced.mp4" length="0" type="video/mp4" />

			</item>
		<item>
		<title>RMF Acceleration Through eMASS Automation</title>
		<link>https://www.steelcloud.com/rmf-acceleration-through-emass-automation/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Tue, 29 Mar 2022 18:19:00 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Webinars]]></category>
		<category><![CDATA[Configuration Management]]></category>
		<category><![CDATA[Digital transformation]]></category>
		<category><![CDATA[emass automation]]></category>
		<category><![CDATA[FedRAMP]]></category>
		<category><![CDATA[IT operations]]></category>
		<category><![CDATA[ITmodernization]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[stig viewer checklist]]></category>
		<category><![CDATA[vulnerability management]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=83143</guid>

					<description><![CDATA[Enterprise Mission Assurance Support Service—eMASS—acts as a repository uniting technical/machine data generated from endpoint scans with the human/non-technical data documented by security/IA personnel. Traditionally, this &#8220;uniting&#8221; process is accomplished by completing a STIG Viewer Checklist for each policy for each endpoint, quickly generating a cumbersome number of hand-created checklist files. With these overwhelming manual processes, ...]]></description>
		
		
		
			</item>
		<item>
		<title>Seven ways automation seals your CMMC certification with a KISS</title>
		<link>https://www.steelcloud.com/seven-ways-automation-seals-your-cmmc-certification-with-a-kiss/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 22 Nov 2021 14:59:11 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CMMC certification with a KISS]]></category>
		<category><![CDATA[CMMC compliance in the DIB]]></category>
		<category><![CDATA[contractor information systems]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Defense Industrial Base]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[DoD STIGS]]></category>
		<category><![CDATA[FERPA]]></category>
		<category><![CDATA[FIPS]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800 - 128]]></category>
		<category><![CDATA[NIST 800-53 CMMC]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[NIST SP 800-53]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82669</guid>

					<description><![CDATA[CMMC certification with a KISS in seven steps KISS—Keep It Simple, Stupid—is a design principle noted by the U.S. Navy in 1960. The KISS principle states that most systems work best if they are kept simple rather than made complicated. In other words, simplicity should be a key goal in design and unnecessary complexity should ...]]></description>
		
		
		
			</item>
		<item>
		<title>CMMC 2.0 Opportunities and Challenges</title>
		<link>https://www.steelcloud.com/cmmc-2-0-opportunities-and-challenges/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 15 Nov 2021 20:53:34 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CMMC compliance in the DIB]]></category>
		<category><![CDATA[contractor information systems]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Defense Industrial Base]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[DoD STIGS]]></category>
		<category><![CDATA[FERPA]]></category>
		<category><![CDATA[FIPS]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800 - 128]]></category>
		<category><![CDATA[NIST 800-53 CMMC]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[NIST SP 800-53]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82630</guid>

					<description><![CDATA[CMMC 2.0 framework offers up a more transparent pathway.  Just when we were all finally wrapping our brains around the Cybersecurity Maturity Model Certification (CMMC) mandate for the defense industrial base (DIB), they went and changed it on us—for the better! In the early morning of November 4, 2021, “Cybersecurity Maturity Model Certification (CMMC) 2.0 Updates and Way ...]]></description>
		
		
		
			</item>
		<item>
		<title>Navigating the CMMC Certification Process</title>
		<link>https://www.steelcloud.com/navigating-the-cmmc-certification-process/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Sat, 06 Nov 2021 17:15:40 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CMMC compliance in the DIB]]></category>
		<category><![CDATA[contractor information systems]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Defense Industrial Base]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[DoD STIGS]]></category>
		<category><![CDATA[FERPA]]></category>
		<category><![CDATA[FIPS]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800 - 128]]></category>
		<category><![CDATA[NIST 800-53 CMMC]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[NIST SP 800-53]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82617</guid>

					<description><![CDATA[Navigating the CMMC Certification Process In 2020, the DoD rolled out its Cybersecurity Maturity Model Certification (CMMC) program. The CMMC certification process requires the defense industrial base (DIB) to attain third-party certification to ensure government contractors practice one of three cybersecurity levels, depending on the kind of data they touch. Although the deadline for CMMC ...]]></description>
		
		
		
			</item>
		<item>
		<title>Tackling the challenges of CMMC compliance in the DIB</title>
		<link>https://www.steelcloud.com/tackling-the-challenges-of-cmmc-compliance-in-the-dib/</link>
		
		<dc:creator><![CDATA[Becky Brown]]></dc:creator>
		<pubDate>Mon, 01 Nov 2021 17:28:52 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Automated STIG Compliance]]></category>
		<category><![CDATA[baseline security controls]]></category>
		<category><![CDATA[CIS security benchmarks]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CMMC compliance in the DIB]]></category>
		<category><![CDATA[contractor information systems]]></category>
		<category><![CDATA[cyber hardening]]></category>
		<category><![CDATA[Defense Industrial Base]]></category>
		<category><![CDATA[DIB]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[DoD STIGS]]></category>
		<category><![CDATA[FERPA]]></category>
		<category><![CDATA[FIPS]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NIST 800 - 128]]></category>
		<category><![CDATA[NIST 800-53 CMMC]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[NIST SP 800-53]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Risk Management Framework]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=82607</guid>

					<description><![CDATA[Tackling the challenges of CMMC compliance in the DIB Trying to wrap your arms around CMMC compliance in the DIB? When it comes to cybersecurity and CMMC compliance in the DIB (defense industrial base), the government means business. And the more sensitive the data is that you handle, the more secure you need to be.  ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
