Skip links

Industry Events

Category Archive Subtitle
Acronis SCS Cyber Backup Hardened Edition Solutions Brief Image

Preparing for DoD’s Cybersecurity Maturation Model Certification

Spearheaded by the Office of Under Secretary of Defense for Acquisition & Sustainment, the Cybersecurity Maturation Model Certification (CMMC) maps out cyber hygiene requirements for all contractors within the defense industrial base. In contrast to past regulations that relied on contractor self-certification, the CMMC requires
FAQ Acronis SCS Cyber Backup 12.5 Hardened Edition

Keeping Government & Industry Aligned on the DoDIN APL

Fill Your Calendar Wisely During COVID-19 In a world of seemingly endless video calls – and the “Zoom fatigue” that too often follows – determining which virtual events are worth attending can sometimes be an exhausting task in and of itself. That choice was simple,
Government-Matters-Segment-Acronis-SCS Blog Featured Image

CEO John Zanni on Government Matters TV

On November 25, 2019, Acronis SCS CEO John Zanni spoke on Government Matters TV in response to the Federal Chief Information Security Officer’s top goals regarding supply chain cybersecurity.  They were joined by Gary Shiffman, founder and CEO of Giant Oak and Adjunct Professor at
Cactuscon Blog Featured Image

The Upshot: CactusCon 2019

Why Go? Last weekend, a fellow colleague of mine at Acronis SCS and I had the opportunity to attend Arizona’s premier security conference, CactusCon, in neighboring Mesa. The annual event, which began in 2012 and is now the largest conference of its kind in the
CMMC Listening Tour Blog Featured Image

CMMC Listening Tour Takeaways

Last month, I attended one of the stops on the Department of Defense’s (DoD) Cybersecurity Maturation Model Certification (CMMC) listening tour to gain a better understanding of future cyber hygiene expectations for the defense industrial base (DIB). The CMMC, which was first announced in June, is the Department’s fresh
Edge Data and Higher Education Blog Featured Image

Neglecting the Edge in Higher Education

During recent discussions with a number of IT decisionmakers across the higher education landscape, an interesting trend emerged. Many of these leaders and their IT teams choose to forego backups of mobile endpoints and edge devices, instead entrusting that responsibility to individual users and employees.