Monday, July 20, 2015

G2 attends IAS Symposium

G2 Inc, an Annapolis Junction Maryland based cyber solutions and services organization, recently participated in the Information Assurance Symposium (IAS) sponsored primarily by the Intelligence Community.

This well attended timely symposium was hosted by the Washington Convention Center. The IAS G2 symposium technical display included a live demonstration of a cloud adaptable, open source, standards based Identity and Access Management (IdAM) technology entitled Enhanced OpenAM. Enhanced OpenAM is built on open source ForgeRock technology, is DoD/IC ready, is easily configurable and accommodates pluggable attribute repositories. Based upon multiple current DoD implementations, this G2 Enhanced OpenAM demonstration generated significant IAS interest. More information can be found by way of the video below.

The video below is from IRM Summit 2014 where Daniel Stroud, CISSP-ISSAP, MCSE, Identity and Access Management Capabilities Lead, G2, Inc. delivered a presentation focused on how to enable dynamic eCitizen systems in environments with distributed PKI administration, Light Weight Directory Access Protocol (LDAP), and distributed attribute repositories using OpenAM. The session will include background on the initial case study and a demonstration.

Wednesday, March 11, 2015

Two G2 experts published by ISACA

We couldn't be more proud of Tom Conkle and Greg Witte two of G2's subject matter experts on NIST's Cybersecurity Framework. 

G2 partnered with ISACA and Tom and Greg's work was recently published in the below publication.


If you would like a copy for your reference, the guide can be purchased here.

Congratulations Tom and Greg on your accomplishments and to that of the whole G2 Federal and Commercial practice  !!!

Monday, January 26, 2015

Greg Witte To Share His COBIT 5 Knowledge

Connect with fellow IT and business leaders at ISACA’s first-of-its-kind COBIT Conference. In addition to creating value for enterprises, COBIT 5 framework can significantly mitigate risk as you will learn in the invaluable session: Cybersecurity and COBIT—where you can leverage Greg Witte’s of G2's insights to:

  • Better understand COBIT 5 principles and how they apply to the cybersecurity landscape
  • Learn how COBIT 5 enablers work with common security frameworks
  • Integrate cybersecurity into enterprise risk management strategy using COBIT

Wednesday, January 21, 2015

G2 selected to speak at the 2015 RSA Conference

G2 received word this week that Tom Conkle has been accepted as a speaker that RSA 2015 Conference in San Francisco. Below is part of Tom's acceptance letter;

"The quality and quantity of submissions for RSA Conference 2015 were at an all-time high, making the selection process extremely competitive.

We are delighted to inform you that your session has been accepted to be part of the RSA Conference 2015 agenda, taking place April 20 - 24, 2015, at The Moscone Center in San Francisco, California. Your session is a valuable contribution to help make this year’s agenda one of the best ever!

Short Abstract: The Cybersecurity Framework (CSF) establishes a common language for describing cybersecurity activities. In 2015 it is anticipated that if voluntary adoption of the framework is not sufficient, the industry specific regulators will leverage the CSF as part of their regulatory oversight process. This session provides an overview and benefits organizations receive from aligning to the CSF."

We are very proud of Tom and the whole Federal and Commercial Practice here at G2.

Stay tuned, we'll post a video after the event.

Wednesday, January 7, 2015

Home Project by Paul Green

Here's Paul's latest Raspberry Pi project.

Take a perfectly good remote control car, rip out the parts that make it work, replace them with a programmable micro-computer (the pi and an Arduino-like board) and wa-la you have a computer controlled toy (via python & WiFi) and three kids who almost got excited about the Internet of Things...‪

It's become painfully clear to me, the cool factor lies in flight. So, after a quick upgrade to Bert, we'll be working on building our own drone I suppose.

#‎GettingMyGeekOn‬ ‪#‎IWonder