Watch the Recorded Webinar
This webinar will cover the realities of the Enterprise Mission Assurance Support Service (eMASS): what works well, what does not work, and how to best make it work for you.
We will discuss how to categorize your system, select applicable controls, and leverage eMASS to assist in this process. Two specific topics that will be covered are how inheritance works in eMASS (and does not work) and the tricky business of uploading STIGs/CKLs (and the painful lessons associated with doing it the wrong way). For those of attending who don’t have eMASS access but will have systems being added to eMASS in the future, we will discuss how to best prepare your system for import into eMASS. There are some tricks to the trade that will make life easier for everyone on the project!
Rebecca spent 8 years in the Air Force as an Intelligence Analyst. During this time, she was selected for a special duty position in Information Assurance, paving her way into cybersecurity. Working at US Central Command, she quickly learned the knowledge and skills required to protect our Nation's most critical systems.
After her time in the Air Force she continued her career supporting the Veterans Administration, NASA and Department of Transportation as a cybersecurity engineer assisting them in ensuring their systems and solutions were, designed, developed and engineered with cyber security embedded. This naturally led her to working with AFRL in educating their Program Managers and Research Scientists in effective solutions to designing and embedding security early in product development.
With over 15 years in cybersecurity focusing on Risk Management, she brings a level of expertise to organizations and systems working towards compliance balancing risk, costs and operational requirements.