cms-gov/security.cms.gov/learn/isso-mentorship-program
2025-02-28 14:41:14 -05:00

1 line
No EOL
276 KiB
Text
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<!DOCTYPE html><html lang="en"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="preload" as="image" href="/_next/static/media/CyberGeek-logo.8e9bbd2b.svg" fetchPriority="high"/><link rel="stylesheet" href="/_next/static/css/ef46db3751d8e999.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/0759e90f4fecfde7.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-182b67d00f496f9d.js"/><script src="/_next/static/chunks/fd9d1056-ad09c71b7719f2fb.js" async=""></script><script src="/_next/static/chunks/23-260042deb5df7a88.js" async=""></script><script src="/_next/static/chunks/main-app-6de3c3100b91a0a9.js" async=""></script><script src="/_next/static/chunks/30-49b1c1429d73281d.js" async=""></script><script src="/_next/static/chunks/317-0f87feacc1712b2f.js" async=""></script><script src="/_next/static/chunks/223-bc9ed43510898bbb.js" async=""></script><script src="/_next/static/chunks/app/layout-9fc24027bc047aa2.js" async=""></script><script src="/_next/static/chunks/972-6e520d137ef194fb.js" async=""></script><script src="/_next/static/chunks/app/page-cc829e051925e906.js" async=""></script><script src="/_next/static/chunks/app/template-d264bab5e3061841.js" async=""></script><script src="/_next/static/chunks/e37a0b60-b74be3d42787b18d.js" async=""></script><script src="/_next/static/chunks/904-dbddf7494c3e6975.js" async=""></script><script src="/_next/static/chunks/549-c87c1c3bbacc319f.js" async=""></script><script src="/_next/static/chunks/app/learn/%5Bslug%5D/page-5b91cdc45a95ebbe.js" async=""></script><link rel="preload" href="/assets/javascript/uswds-init.min.js" as="script"/><link rel="preload" href="/assets/javascript/uswds.min.js" as="script"/><title>ISSO Mentorship Program | CMS Information Security &amp; Privacy Group</title><meta name="description" content="ISPG program that pairs CMS Information System Security Officers (ISSOs) with their peers for knowledge sharing and support"/><link rel="canonical" href="https://security.cms.gov/learn/isso-mentorship-program"/><meta name="google-site-verification" content="GMZIwBDJgz_o_JYUB2GpJazkrs7P85BaWDsoCjxF32M"/><meta property="og:title" content="ISSO Mentorship Program | CMS Information Security &amp; Privacy Group"/><meta property="og:description" content="ISPG program that pairs CMS Information System Security Officers (ISSOs) with their peers for knowledge sharing and support"/><meta property="og:url" content="https://security.cms.gov/learn/isso-mentorship-program"/><meta property="og:image:type" content="image/jpeg"/><meta property="og:image:width" content="1200"/><meta property="og:image:height" content="630"/><meta property="og:image" content="https://security.cms.gov/learn/isso-mentorship-program/opengraph-image.jpg?d21225707c5ed280"/><meta property="og:type" content="website"/><meta name="twitter:card" content="summary_large_image"/><meta name="twitter:title" content="ISSO Mentorship Program | CMS Information Security &amp; Privacy Group"/><meta name="twitter:description" content="ISPG program that pairs CMS Information System Security Officers (ISSOs) with their peers for knowledge sharing and support"/><meta name="twitter:image:type" content="image/jpeg"/><meta name="twitter:image:width" content="1200"/><meta name="twitter:image:height" content="630"/><meta name="twitter:image" content="https://security.cms.gov/learn/isso-mentorship-program/opengraph-image.jpg?d21225707c5ed280"/><link rel="icon" href="/favicon.ico" type="image/x-icon" sizes="48x48"/><script>(self.__next_s=self.__next_s||[]).push(["/assets/javascript/uswds-init.min.js",{}])</script><script src="/_next/static/chunks/polyfills-78c92fac7aa8fdd8.js" noModule=""></script></head><body><a class="usa-skipnav" href="#main">Skip to main content</a><section class="usa-banner" aria-label="Official website of the United States government"><div class="usa-accordion"><header class="usa-banner__header"><div class="usa-banner__inner"><div class="grid-col-auto"><img aria-hidden="true" alt="" loading="lazy" width="16" height="11" decoding="async" data-nimg="1" class="usa-banner__header-flag" style="color:transparent" srcSet="/_next/image?url=%2Fassets%2Fimg%2Fus_flag_small.png&amp;w=16&amp;q=75 1x, /_next/image?url=%2Fassets%2Fimg%2Fus_flag_small.png&amp;w=32&amp;q=75 2x" src="/_next/image?url=%2Fassets%2Fimg%2Fus_flag_small.png&amp;w=32&amp;q=75"/></div><div class="grid-col-fill tablet:grid-col-auto" aria-hidden="true"><p class="usa-banner__header-text">An official website of the United States government</p><p class="usa-banner__header-action">Here&#x27;s how you know</p></div><button type="button" class="usa-accordion__button usa-banner__button" aria-expanded="false" aria-controls="gov-banner-default-default"><span class="usa-banner__button-text">Here&#x27;s how you know</span></button></div></header><div class="usa-banner__content usa-accordion__content" id="gov-banner-default-default" hidden=""><div class="grid-row grid-gap-lg"><div class="usa-banner__guidance tablet:grid-col-6"><img role="img" alt="" aria-hidden="true" loading="lazy" width="40" height="40" decoding="async" data-nimg="1" class="usa-banner__icon usa-media-block__img" style="color:transparent" src="/_next/static/media/icon-dot-gov.3e9cb1b5.svg"/><div class="usa-media-block__body"><p><strong>Official websites use .gov</strong><br/>A <strong>.gov</strong> website belongs to an official government organization in the United States.</p></div></div><div class="usa-banner__guidance tablet:grid-col-6"><img role="img" alt="" aria-hidden="true" loading="lazy" width="40" height="40" decoding="async" data-nimg="1" class="usa-banner__icon usa-media-block__img" style="color:transparent" src="/_next/static/media/icon-https.e7f1a222.svg"/><div class="usa-media-block__body"><p><strong>Secure .gov websites use HTTPS</strong><br/>A <strong>lock</strong> (<span class="icon-lock"><svg xmlns="http://www.w3.org/2000/svg" width="52" height="64" viewBox="0 0 52 64" class="usa-banner__lock-image" role="img" aria-labelledby="banner-lock-description-default" focusable="false"><title id="banner-lock-title-default">Lock</title><desc id="banner-lock-description-default">Locked padlock icon</desc><path fill="#000000" fill-rule="evenodd" d="M26 0c10.493 0 19 8.507 19 19v9h3a4 4 0 0 1 4 4v28a4 4 0 0 1-4 4H4a4 4 0 0 1-4-4V32a4 4 0 0 1 4-4h3v-9C7 8.507 15.507 0 26 0zm0 8c-5.979 0-10.843 4.77-10.996 10.712L15 19v9h22v-9c0-6.075-4.925-11-11-11z"></path></svg></span>) or <strong>https://</strong> means you&#x27;ve safely connected to the .gov website. Share sensitive information only on official, secure websites.</p></div></div></div></div></div></section><div class="usa-overlay"></div><header class="usa-header usa-header--extended"><div class="bg-primary-dark"><div class="usa-navbar"><div class="usa-logo padding-y-4 padding-right-3" id="CyberGeek-logo"><a title="CMS CyberGeek Home" href="/"><img alt="CyberGeek logo" fetchPriority="high" width="298" height="35" decoding="async" data-nimg="1" style="color:transparent" src="/_next/static/media/CyberGeek-logo.8e9bbd2b.svg"/></a></div><button aria-label="Open menu" type="button" class="usa-menu-btn" data-cy="menu-button">Menu</button></div></div><nav aria-label="Primary navigation" class="usa-nav padding-0 desktop:width-auto bg-white grid-container float-none"><div class="usa-nav__inner"><button type="button" class="usa-nav__close margin-0"><img alt="Close" loading="lazy" width="24" height="24" decoding="async" data-nimg="1" style="color:transparent" src="/_next/static/media/close.1fafc2aa.svg"/></button><ul class="usa-nav__primary usa-accordion"><li class="usa-nav__primary-item"><button type="button" class="usa-accordion__button usa-nav__link font-family-serif text-medium tablet:text-no-wrap desktop:text-primary-vivid" aria-expanded="false" aria-controls="roles"><span>Roles</span></button><ul id="roles" class="usa-nav__submenu usa-megamenu bg-white" hidden=""><li class="grid-row grid-gap-3 padding-bottom-6"><div class="usa-col text-center desktop:text-right text-normal position-relative nav-label"><span class="display-block font-heading-xl padding-top-2">Roles</span></div><div class="usa-col"><section><h3 class="usa-col__list-header"><a href="/ispg/information-system-security-officer-isso">Information System Security Officer (ISSO)</a></h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/policy-guidance/cms-information-system-security-officer-isso-handbook"><span>ISSO Handbook</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/policy-guidance/cms-information-system-security-officer-isso-handbook#getting-started-for-new-issos"><span>Getting started (for new ISSOs)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/isso-mentorship-program"><span>ISSO Mentorship Program</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/policy-guidance/cms-information-system-security-officer-isso-handbook#training"><span>ISSO Training</span></a></li></ul></section></div><div class="usa-col"><section><h3 class="usa-col__list-header"><a href="/ispg/data-guardian">Data Guardian</a></h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/policy-guidance/data-guardian-handbook"><span>Data Guardian Handbook</span></a></li></ul></section></div><div class="usa-col"><section><h3 class="usa-col__list-header"><a href="/ispg/cyber-risk-advisor-cra">Cyber Risk Advisor (CRA)</a></h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cms-security-and-privacy-handbooks"><span>CMS Security and Privacy Handbooks</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cms-security-and-privacy-handbooks#risk-management-handbook-rmh-chapters"><span>Risk Management Handbook (RMH)</span></a></li></ul></section></div><div class="usa-col"><section><h3 class="usa-col__list-header"><a href="/ispg/business-system-owner">Business / System Owner (BO/SO)</a></h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cybersecurity-risk-assessment-program-csrap"><span>Cybersecurity and Risk Assessment Program (CSRAP)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cms-information-exchange-agreement-iea"><span>Information Exchange Agreement (IEA)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cms-computer-matching-agreement-cma"><span>Computer Matching Agreement (CMA)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/isso-service"><span>ISSO As A Service</span></a></li></ul></section></div></li></ul></li><li class="usa-nav__primary-item"><button type="button" class="usa-accordion__button usa-nav__link font-family-serif text-medium tablet:text-no-wrap desktop:text-primary-vivid" aria-expanded="false" aria-controls="compliance-authorization"><span>Compliance &amp; Authorization</span></button><ul id="compliance-authorization" class="usa-nav__submenu usa-megamenu bg-white" hidden=""><li class="grid-row grid-gap-3 padding-bottom-6"><div class="usa-col text-center desktop:text-right text-normal position-relative nav-label"><span class="display-block font-heading-xl padding-top-2">Compliance &amp; Authorization</span></div><div class="usa-col"><section><h3 class="usa-col__list-header"><a href="/learn/authorization-operate-ato">Authorization to Operate (ATO)</a></h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/authorization-operate-ato"><span>About ATO at CMS</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/authorization-operate-ato#types-of-authorizations"><span>Types of authorizations</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/authorization-operate-ato#ato-stakeholders"><span>ATO stakeholders</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/authorization-operate-ato#related-documents-and-resources"><span>ATO tools and resources</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cms-technical-reference-architecture-tra"><span>CMS Technical Reference Architecture (TRA)</span></a></li></ul></section></div><div class="usa-col"><section><h3 class="usa-col__list-header"><a href="/learn/ongoing-authorization-oa">Ongoing Authorization (OA)</a></h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/ongoing-authorization-oa"><span>About OA at CMS</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/ongoing-authorization-oa#is-my-system-eligible-for-oa"><span>OA eligibility requirements</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/continuous-diagnostics-and-mitigation-cdm"><span>Continuous Diagnostics and Mitigation (CDM)</span></a></li></ul></section></div><div class="usa-col"><section><h3 class="usa-col__list-header list-header-margin">Assessments &amp; Audits</h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/penetration-testing-pentesting"><span>Penetration Testing</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cybersecurity-risk-assessment-program-csrap"><span>Cybersecurity Risk Assessment Program (CSRAP)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/privacy-impact-assessment-pia"><span>Privacy Impact Assessment (PIA)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/security-impact-analysis-sia"><span>Security Impact Analysis (SIA)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/system-audits"><span>System Audits</span></a></li></ul></section></div></li></ul></li><li class="usa-nav__primary-item"><button type="button" class="usa-accordion__button usa-nav__link font-family-serif text-medium tablet:text-no-wrap desktop:text-primary-vivid" aria-expanded="false" aria-controls="policy-guidance"><span>Policy &amp; Guidance</span></button><ul id="policy-guidance" class="usa-nav__submenu usa-megamenu bg-white" hidden=""><li class="grid-row grid-gap-3 padding-bottom-6"><div class="usa-col text-center desktop:text-right text-normal position-relative nav-label"><span class="display-block font-heading-xl padding-top-2">Policy &amp; Guidance</span></div><div class="usa-col"><section><h3 class="usa-col__list-header"><a href="/ispg/cms-policies-and-guidance">CMS Policies and Guidance</a></h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/policy-guidance/cms-acceptable-risk-safeguards-ars"><span>CMS Acceptable Risk Safeguards (ARS)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/policy-guidance/cms-information-systems-security-privacy-policy-is2p2"><span>CMS Information Security and Privacy Policy (IS2P2)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cms-security-and-privacy-handbooks"><span>CMS Security and Privacy Handbooks</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="https://security.cms.gov/learn/cms-risk-management-framework-rmf"><span>CMS Risk Management Framework (RMF)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/email-encryption-requirements-cms"><span>CMS Email Encryption</span></a></li></ul></section></div><div class="usa-col"><section><h3 class="usa-col__list-header"><a href="/ispg/federal-policies-and-guidance">Federal Policies and Guidance</a></h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/national-institute-standards-and-technology-nist"><span>National Institute of Standards and Technology (NIST)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/federal-information-security-modernization-act-fisma"><span>Federal Information Security Modernization Act (FISMA)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/fedramp"><span>Federal Risk and Authorization Management Program (FedRAMP)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/zero-trust"><span>Zero Trust</span></a></li></ul></section></div></li></ul></li><li class="usa-nav__primary-item"><button type="button" class="usa-accordion__button usa-nav__link font-family-serif text-medium tablet:text-no-wrap desktop:text-primary-vivid" aria-expanded="false" aria-controls="system-security"><span>System Security</span></button><ul id="system-security" class="usa-nav__submenu usa-megamenu bg-white" hidden=""><li class="grid-row grid-gap-3 padding-bottom-6"><div class="usa-col text-center desktop:text-right text-normal position-relative nav-label"><span class="display-block font-heading-xl padding-top-2">System Security</span></div><div class="usa-col"><section><h3 class="usa-col__list-header"><a href="/ispg/application-security">Application Security</a></h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/threat-modeling"><span>Threat Modeling</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/zero-trust"><span>Zero Trust</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cms-cloud-services"><span>CMS Cloud Services</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/software-bill-materials-sbom"><span>Software Bill of Materials (SBOM)</span></a></li></ul></section></div><div class="usa-col"><section><h3 class="usa-col__list-header"><a href="/ispg/security-operations">Security Operations</a></h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/policy-guidance/risk-management-handbook-chapter-8-incident-response-ir"><span>Incident Response</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cms-cybersecurity-integration-center-ccic"><span>CMS Cybersecurity Integration Center (CCIC)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/penetration-testing-pentesting"><span>Penetration Testing</span></a></li></ul></section></div><div class="usa-col"><section><h3 class="usa-col__list-header"><a href="/ispg/risk-management-and-reporting">Risk Management and Reporting</a></h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/continuous-diagnostics-and-mitigation-cdm"><span>Continuous Diagnostics and Mitigation (CDM)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cyber-risk-reports"><span>Cyber Risk Reports</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/plan-action-and-milestones-poam"><span>Plan of Action and Milestones (POA&amp;M)</span></a></li></ul></section></div></li></ul></li><li class="usa-nav__primary-item"><button type="button" class="usa-accordion__button usa-nav__link font-family-serif text-medium tablet:text-no-wrap desktop:text-primary-vivid" aria-expanded="false" aria-controls="privacy"><span>Privacy</span></button><ul id="privacy" class="usa-nav__submenu usa-megamenu bg-white" hidden=""><li class="grid-row grid-gap-3 padding-bottom-6"><div class="usa-col text-center desktop:text-right text-normal position-relative nav-label"><span class="display-block font-heading-xl padding-top-2">Privacy</span></div><div class="usa-col"><section><h3 class="usa-col__list-header list-header-margin">Agreements</h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cms-computer-matching-agreement-cma"><span>Computer Matching Agreement (CMA)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cms-information-exchange-agreement-iea"><span>Information Exchange Agreement (IEA)</span></a></li></ul></section></div><div class="usa-col"><section><h3 class="usa-col__list-header list-header-margin">Privacy Activities</h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/breach-response"><span>Breach Response</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/privacy-impact-assessment-pia"><span>Privacy Impact Assessment (PIA)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/system-records-notice-sorn"><span>System of Records Notice (SORN)</span></a></li></ul></section></div><div class="usa-col"><section><h3 class="usa-col__list-header list-header-margin">Privacy Resources</h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/ispg/privacy"><span>Privacy at CMS</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/policy-guidance/cms-breach-response-handbook"><span>CMS Breach Response Handbook</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/health-insurance-portability-and-accountability-act-1996-hipaa"><span>Health Insurance Portability and Accessibility Act (HIPAA)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/policy-guidance/cms-privacy-impact-assessment-pia-handbook"><span>CMS Privacy Impact Assessment (PIA) Handbook</span></a></li></ul></section></div></li></ul></li><li class="usa-nav__primary-item"><button type="button" class="usa-accordion__button usa-nav__link font-family-serif text-medium tablet:text-no-wrap desktop:text-primary-vivid" aria-expanded="false" aria-controls="tools-services"><span>Tools &amp; Services</span></button><ul id="tools-services" class="usa-nav__submenu usa-megamenu bg-white" hidden=""><li class="grid-row grid-gap-3 padding-bottom-6"><div class="usa-col text-center desktop:text-right text-normal position-relative nav-label"><span class="display-block font-heading-xl padding-top-2">Tools &amp; Services</span></div><div class="usa-col"><section><h3 class="usa-col__list-header list-header-margin">Reporting &amp; Compliance</h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="https://security.cms.gov/learn/isso-service"><span>ISSO As A Service</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cms-fisma-continuous-tracking-system-cfacts"><span>CFACTS</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cyber-risk-reports"><span>Cyber Risk Reports and Dashboards</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/continuous-diagnostics-and-mitigation-cdm"><span>Continuous Diagnostics and Mitigation (CDM)</span></a></li></ul></section></div><div class="usa-col"><section><h3 class="usa-col__list-header list-header-margin">System Security</h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/threat-modeling"><span>Threat Modeling</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cms-cloud-services"><span>CMS Cloud Services</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cms-cybersecurity-integration-center-ccic"><span>CMS Cybersecurity Integration Center (CCIC)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="https://security.cms.gov/learn/cms-security-data-lake-sdl"><span>CMS Security Data Lake (SDL)</span></a></li></ul></section></div><div class="usa-col"><section><h3 class="usa-col__list-header list-header-margin">Tests &amp; Assessments</h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cybersecurity-risk-assessment-program-csrap"><span>Cybersecurity Risk Assessment Program (CSRAP)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/penetration-testing-pentesting"><span>Penetration Testing</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/privacy-impact-assessment-pia"><span>Privacy Impact Assessment (PIA)</span></a></li></ul></section></div></li></ul></li></ul><div class="usa-nav__secondary padding-left-2"><section aria-label="Header search box"><form class="usa-search usa-search--small" role="search" action="/search"><label class="usa-sr-only" for="header-search-box">Search</label><input class="usa-input search__input" id="header-search-box" type="search" name="ispg[query]"/><button aria-label="header search box button" class="usa-button" id="header-search-box-btn" type="submit"><svg aria-describedby="searchIcon" class="usa-icon" aria-hidden="true" focusable="false" role="img"><title id="searchIcon">Search</title><use href="/assets/img/sprite.svg#search"></use></svg></button></form></section></div></div></nav></header><main id="main"><div id="template"><!--$--><!--/$--><section class="hero hero--theme-explainer undefined"><div class="maxw-widescreen margin-x-auto padding-x-2 desktop:padding-x-0 padding-top-4 padding-bottom-6 desktop:padding-y-7"><div class="tablet:grid-container position-relative "><div class="hero__row grid-row grid-gap"><div class="tablet:grid-col-5 widescreen:position-relative"></div><div class="hero__column tablet:grid-col-7 flow padding-bottom-2"><h1 class="hero__heading margin-0 line-height-sans-3 desktop:line-height-sans-2">ISSO Mentorship Program</h1><p class="hero__description">ISPG program that pairs CMS Information System Security Officers (ISSOs) with their peers for knowledge sharing and support</p><div class="hero__meta radius-lg padding-x-2 padding-y-1 bg-white font-sans-2xs line-height-sans-5 display-inline-block text-primary-darker">Contact: <span class="text-bold">ISSO Support Team</span><span class="hidden-mobile"> | </span><span class="break-mobile"><a href="mailto:ISSO@cms.hhs.gov">ISSO@cms.hhs.gov</a></span></div></div><div class="tablet:position-absolute tablet:top-0"><div class="[ flow ] bg-primary-light radius-lg padding-2 text-base-darkest maxw-mobile"><div class="display-flex flex-align-center font-sans-lg margin-bottom-2 text-italic desktop:text-no-wrap"><img alt="slack logo" loading="lazy" width="21" height="21" decoding="async" data-nimg="1" class="display-inline margin-right-1" style="color:transparent" src="/_next/static/media/slackLogo.f5836093.svg"/>CMS Slack Channel</div><ul class="add-list-reset"><li class="line-height-sans-5 margin-top-0">#cms-isso</li></ul></div></div></div></div></div></section><div class="grid-container"><div class="grid-row grid-gap margin-top-5"><div class="tablet:grid-col-4"><nav class="table-of-contents overflow-y-auto overflow-x-hidden position-sticky top-3 padding-1 radius-lg shadow-2 display-none tablet:display-block" aria-label="Table of contents"><div class="text-uppercase text-bold border-bottom border-base-lighter padding-bottom-1">Table of Contents</div><p class="text-italic text-base font-sans-xs">No table of content entries to display.</p></nav></div><div class="tablet:grid-col-8 content"><section><div class="text-block text-block--theme-explainer"><h2>What is the ISSO Mentorship Program?</h2><p>The CMS ISSO Mentorship Program seeks to improve the overall readiness and skill of Information System Security Officers (ISSOs) at CMS by creating opportunities for knowledge sharing and support among ISSOs of all experience levels. Both mentors and mentees benefit from a partnership that is structured enough to provide growth towards defined goals yet flexible enough that anyone can participate.</p><p>Because the role of an ISSO is critical for ensuring security and privacy compliance for FISMA systems, this program dedicated to helping ISSOs succeed improves the overall security posture and culture at CMS.</p></div><section class="callout callout--type-explainer [ flow ] font-size-md radius-lg line-height-sans-5"><h1 class="callout__header text-bold font-sans-lg"><svg class="usa-icon" aria-hidden="true" focusable="false" role="img"><use href="/assets/img/sprite.svg#info_outline"></use></svg>Get started with ISSO mentorship</h1><p>If you want to request a mentor or become a mentor, send an email to the ISSO Support Team: ISSO@cms.hhs.gov and include the word &quot;Mentorship&quot; in the subject line.</p></section><div class="text-block text-block--theme-explainer"><h2>Is mentorship right for me?</h2><p>If you are an ISSO at CMS (either federal staff or contractor support), you are eligible for the program. There are many benefits to participating in mentorship as either a mentee or a mentor.</p><h3>For mentees</h3><p>You may want to consider participating <strong>as a mentee</strong> if:</p><p><strong>You are a new ISSO at CMS.</strong></p><p>Whether you are brand new to the role of Information System Security Officer or you are onboarding as a <a href="https://cybergeek.cms.gov/learn/isso-service">Service ISSO</a>, teaming up with an experienced CMS ISSO can smooth your orientation and help you gain confidence in your new role. Your mentor can point you to resources, teach you to use them effectively, and share tips about the CMS “way of doing things”.</p><p><strong>You are dealing with an unfamiliar or challenging task.</strong></p><p>Even if youre not a new ISSO, the mentorship program offers an opportunity for bootstrap support on new or challenging projects. You can be paired with an experienced ISSO and benefit from their lessons learned whether that means getting support towards a long-term goal like <a href="https://cybergeek.cms.gov/learn/authorization-operate-ato">Authorization to Operate (ATO)</a> or focused assistance on a specific task.</p><p><strong>You want to expand your skills as an ISSO.</strong></p><p>Mentorship isnt just for onboarding or overcoming challenges. It can also be a tool for relationship building and professional development. You may choose to participate in the program to expand your skills and learn about new tools or practices. Having a trusted peer in your field can help you reach beyond your comfort zone and grow your career and network.</p><p><strong>You are not an ISSO, but want to learn about the role.</strong></p><p>Even non-ISSOs can apply to be mentored, with approval from their supervisor and the ISSO Support Team. If you are thinking of transitioning to an ISSO role, mentorship provides an opportunity to get real-world insight and advice.</p><h3>For mentors</h3><p>You may want to consider participating <strong>as a mentor</strong> if:</p><p><strong>You enjoy helping others.</strong></p><p>We encourage experienced ISSOs to consider the motto, “Pass it on!” Knowing that much of your current success is the result of others investment of time and energy in your life, you may want to pay that investment forward by helping someone else to grow and learn.</p><p><strong>You want to expand your leadership skills.</strong></p><p>Mentoring offers a way for experienced ISSOs to practice interpersonal skills such as active listening, establishing trust, and teaching by example. These skills are valued by employers and co-workers alike and are essential for advancing into leadership roles. Serving as a mentor also gives you a practical way to demonstrate your hard-earned expertise.</p><p><strong>You care deeply about CMS security culture.</strong></p><p>Information security and privacy at CMS are not just for compliance they are essential for building trust with our beneficiaries, customers, and the American public. Mentoring provides an opportunity to build a more knowledgeable ISSO workforce and advance security awareness at CMS, resulting in a stronger overall security posture for our FISMA systems.</p><p><strong>You value self-reflection and continuous improvement.</strong></p><p>A growth mindset remains important even for experienced ISSOs. Mentoring a peer can motivate you to learn more about yourself and identify areas where you want to continue learning. In a healthy mentorship, the mentee will often have valuable insights for the mentor as well.</p><h2>How it works</h2><p>The mentorship program is flexible and based on the specific needs of mentors and mentees. The ISSO Support Team works with interested individuals to find an appropriate partner for a mentorship engagement (based on the goals and desired outcomes of both parties). From there, the two ISSOs decide how they will work together and for how long.</p><h3>What mentorship is not</h3><p>While ISSO mentorship can bring valuable benefits to both of the people involved, its important to understand what the program is <strong>not </strong>meant to address.</p><ul><li><strong>Mentors dont complete work on behalf of mentees</strong>. They can offer support, resources, and lessons learned but the mentee remains responsible for their own work.</li><li>&nbsp;<strong>Mentorship is not Training.</strong> Mentorship focuses on a personalized, long-term relationship with a more experienced individual providing guidance and support based on their experience, while training is a structured process of delivering specific knowledge and skills through a set curriculum, often in a group setting, with a more teacher-student dynamic.</li><li><strong>Mentorship is not a shortcut</strong>. While it will help mentees be more effective in their role, the mentorship itself requires an investment of time and energy. Its not an “easy fix” for challenges, but rather an opportunity for both people to grow their skills.</li><li><strong>The mentor is not a manager. </strong>The mentee does not report to the mentor, and the mentor does not evaluate the mentee. Instead, they share and learn together in a structured yet flexible arrangement.</li><li><strong>Mentorship is not a requirement.</strong> The ISSO Mentorship Program is a completely voluntary though highly encouraged opportunity for growth and professional development.</li></ul><h3>Successful ISSO mentorship at CMS</h3><p>Mentoring has proven to be a highly <a href="https://www.govtech.com/blogs/lohrmann-on-cybersecurity/security-pros-need-a-mentor-heres-why-and-how.html">beneficial activity for cybersecurity professionals</a>, but not everyone is familiar with how mentorships should work. To be successful in partnership with another ISSO, keep the following in mind:</p><p><strong>Mentoring is a two-way street.</strong></p><p>Both mentors and mentees will benefit from a healthy mentoring partnership. They can both learn from one another regardless of age, background, or level of experience. Successful mentorships are built on mutual trust and willingness to learn. This doesnt mean the mentor and mentee must become friends, but they should have respect and appreciation for one other.</p><p><strong>Mentees hold the most responsibility.</strong></p><p>It may surprise you to learn that the mentor is not the primary driver of the partnership. In the ISSO Mentorship Program, mentees have the greater responsibility to set goals, schedule meetings, and prepare materials and questions in advance to make sure time is spent effectively. While both people can share some of these responsibilities, the mentee should consider themselves the main driver.</p><p><strong>It's okay to end a mentorship that isn't working.</strong></p><p>Not all partnerships are an ideal match. This could be due to various factors such as logistical challenges, a shift in priorities for either party, or personality differences. Its important to communicate with clarity and empathy and be willing to amicably end the mentorship if its not working well. This is not a negative reflection on the mentor or mentee.</p></div><div class="text-block text-block--theme-explainer"><h2>Steps to get started</h2><p>Whether you want to be a mentor or mentee, these are the steps you can take to begin participation in the ISSO Mentorship Program:</p></div><div><ol class="usa-process-list"><li class="usa-process-list__item"><h4 class="usa-process-list__heading">Decide on your goals</h4><div class="margin-top-05 usa-process-list__description"><p>As a mentor, think about what you can offer and how you would like to help other ISSOs. As a mentee, consider specific skills or knowledge you want to gain. Setting goals and desired outcomes from the beginning will ensure a more effective partnership.</p></div></li><li class="usa-process-list__item"><h4 class="usa-process-list__heading">Get manager approval</h4><div class="margin-top-05 usa-process-list__description"><p>Anyone who participates in mentorship must get approval from their manager. Though the time commitment is flexible, it will require some investment and could result in periods of reduced availability for day to day work. As a mentor or mentee, make sure your manager understands and approves of your planned level of participation in the program.</p></div></li><li class="usa-process-list__item"><h4 class="usa-process-list__heading">Send a request to the ISSO team</h4><div class="margin-top-05 usa-process-list__description"><p>Getting started with ISSO mentorship is easy. Just send an email to <a href="mailto:ISSO@cms.hhs.gov">ISSO@cms.hhs.gov</a> and include the word <strong>Mentorship</strong> in the subject line. Someone will contact you to set up an initial orientation meeting.</p></div></li><li class="usa-process-list__item"><h4 class="usa-process-list__heading">Complete orientation</h4><div class="margin-top-05 usa-process-list__description"><p>The ISSO Support Team meets with a potential mentor or mentee to introduce them to the program and learn about the individuals goals for participation and learning. Allow about an hour for this meeting. It will help you know what to expect, how to get assistance if needed, and how to plan an effective engagement from beginning to end. After orientation, the ISSO Support Team will have the information they need to find an appropriate match (either a mentor or mentee) for you.</p></div></li><li class="usa-process-list__item"><h4 class="usa-process-list__heading">Meet with your mentor / mentee</h4><div class="margin-top-05 usa-process-list__description"><p>Once you are put in touch with your mentorship partner, schedule your first meeting so you can get to know each other. This can be scheduled by either the mentor or mentee. Both should come prepared to discuss goals and desired outcomes for the engagement, along with logistic preferences such as meeting cadence and location. Take the time to make this meeting count! Whether you meet in person or virtually, try to reduce distractions and bring your full focus.</p></div></li><li class="usa-process-list__item"><h4 class="usa-process-list__heading">Establish format and frequency</h4><div class="margin-top-05 usa-process-list__description"><p>Share your preferred ways of communicating and decide what works best for both of you. This could be virtual meetings, email notes, telephone calls, in-person meetings, or a combination. Make sure to note any times of non-availability (such as flex days). A weekly cadence is encouraged to keep up your momentum, but the arrangement is flexible and can be adjusted as needed. Regardless, you should give your mentorship meetings a high priority and your thoughtful attention.</p></div></li><li class="usa-process-list__item"><h4 class="usa-process-list__heading">Start your mentorship journey</h4><div class="margin-top-05 usa-process-list__description"><p>As you begin sharing and learning together on a regular basis, you may decide to adjust your schedule, methods, or even goals. This is fine, as long as you both feel that the partnership is still beneficial. At the beginning, you should set a time frame for the engagement (based on the desired outcomes), but this is also subject to change if mutually agreed upon. Check in frequently, communicate clearly, and feel free to reach out to the ISSO Support Team if either of you needs assistance along the way!</p></div></li></ol></div><div class="text-block text-block--theme-explainer"><h2>Tips for mentors</h2><p>You will be most successful as a mentor in the program if you:</p><ul><li><strong>Teach by example. </strong>Remember the mentee will take their cues from your actions (not only your words). Model the behaviors and work ethics that will help them succeed.</li><li><strong>Share about failures as well as successes. </strong>You as a mentor are not expected to be perfect. Sharing lessons learned from past failures will help your mentee avoid similar mistakes.</li><li><strong>Keep the mentee at the center. </strong>While you as a mentor will definitely benefit from the partnership, remember that the mentees growth and learning is top priority.</li><li><strong>Use helpful frameworks</strong>. While ad hoc conversations can be beneficial, your mentee might benefit from the use of structured frameworks such as <a href="https://www.insala.com/blog/how-to-become-a-successful-mentor">SMART goals and SWOT analysis</a>.</li><li><strong>Be open to learning</strong>. Mentors and not just mentees can expect to grow and learn from the partnership. Keep an open mind, and see what your mentee may be able to teach or show you.</li><li><strong>Share experiences instead of dictating actions.</strong> You can explain how you handled a similar situation or make suggestions based on past lessons learned but try to let the mentee come to their own conclusions.</li><li><strong>Be a connector.</strong> Your knowledge of people and resources at CMS are a treasure trove to your mentee. Point them to valuable tools like the <a href="/policy-guidance/cms-information-system-security-officer-isso-handbook">ISSO Handbook</a> and introduce them to more people they can learn from.</li><li><strong>Be honest.</strong> Dont be afraid to challenge your mentee if their ideas or actions are headed off-course. Be kind but direct with your feedback so they can improve and hold themselves accountable to their goals.</li><li><strong>Be approachable and available</strong>. Regular connection with your mentee is necessary for you to maintain a thriving relationship. While the two of you will decide together on meeting frequency, make sure they feel comfortable reaching out for guidance.</li><li><strong>Ask for help</strong>. Even as the mentor, you can ask questions or get help anytime from the ISSO Support Team: <a href="mailto:ISSO@cms.hhs.gov">ISSO@cms.hhs.gov</a>. Please dont hesitate to reach out.</li></ul><h2>Tips for mentees</h2><p>You will be most successful as a mentee in the program if you:</p><ul><li><strong>Set SMART goals</strong>. Take time to document clear goals with specific outcomes <a href="https://www.atlassian.com/blog/productivity/how-to-write-smart-goals">SMART goals</a> are <em>Specific, Measurable, Achievable, Relevant, and Time-Bound</em>. Make sure your goals for the mentorship are realistic, taking the availability and experience of your mentor into consideration.</li><li><strong>Take responsibility.</strong> Your mentor can provide tools and advice, but you are ultimately responsible for your own growth and learning. Be an active and eager participant in the process. Take initiative and take notes!</li><li><strong>Take appropriate risks.</strong> Your mentor may help you stretch beyond your comfort zone and lean in to new opportunities. Appropriate risk-taking is excellent for growth. Dont be afraid to make mistakes as long as you learn from them.</li><li><strong>Respect your mentors time</strong>. Remember your mentor is a volunteer, giving of their time to help you grow. Make the most of the time you have with them. Always come prepared with an agenda, and let them know well in advance if you need to reschedule.</li><li><strong>Understand your mentors limits.</strong> Your mentor will help you as much as they can, but if you have a need they cant address because of limited time or lack of experience in a specific realm, they will point you to resources or other people who can help.</li><li><strong>Give helpful feedback</strong>. Be honest about your needs and goals. Ask questions if theres something you dont understand. Your mentor cant read your mind, so let them know if theres something else they can do to help and when they are doing a great job!</li><li><strong>Invest in the relationship</strong>. Trust and mutual respect do not happen automatically when the mentorship begins. You can nurture the relationship by showing appreciation, communicating thoughtfully, and demonstrating a growth mindset.</li><li><strong>Ask for help</strong>. Remember your mentor is there to support you, so ask questions when you have them. Regarding the mentorship itself, you can also ask questions or get help anytime from the ISSO Support Team: <a href="mailto:ISSO@cms.hhs.gov">ISSO@cms.hhs.gov</a>.</li></ul><h2>ISSO resources</h2><p>For anyone participating in the ISSO Mentorship Program, its important to have quick access to ISSO resources provided by CMS and other organizations.&nbsp;</p><p>The <a href="/policy-guidance/cms-information-system-security-officer-isso-handbook">CMS Information Systems Security Officer (ISSO) Handbook</a> is the authoritative guide for everything a CMS ISSO needs. As a mentor or mentee, this handbook is your trusted tool to help you find useful information like:</p><p><a href="/policy-guidance/cms-information-system-security-officer-isso-handbook#getting-started-for-new-issos"><strong>Tips for getting started</strong></a><strong> -&nbsp;</strong>Everything a new ISSO needs for onboarding at CMS, including self-assessment, initial meetings, and goals for the first year.</p><p><a href="/policy-guidance/cms-information-system-security-officer-isso-handbook#role-responsibilities"><strong>Role and responsibilities</strong></a>&nbsp;-&nbsp;Learn whats expected of an ISSO at CMS, and how to perform all required duties.</p><p><a href="/policy-guidance/cms-information-system-security-officer-isso-handbook#isso-toolkit"><strong>ISSO toolkit</strong></a><strong>&nbsp;- </strong>Everything you need to be successful as an ISSO, including helpful documents,&nbsp;events, Slack channels, tools, and programs.</p><p><a href="/policy-guidance/cms-information-system-security-officer-isso-handbook#training"><strong>Training opportunities</strong></a><strong> -&nbsp;</strong>Browse free training offerings from CMS and HHS to help ISSOs of all skill levels advance their knowledge and grow in their careers.</p></div></section></div></div></div></div></main><footer class="usa-footer usa-footer--slim"><div class="grid-container"><div class="grid-row flex-align-end"><div class="grid-col"><div class="usa-footer__return-to-top"><a class="font-sans-xs" href="#">Return to top</a></div></div><div class="grid-col padding-bottom-2 padding-top-4 display-flex flex-justify-end"><a class="usa-button" href="/feedback">Give feedback</a></div></div></div><div class="usa-footer__primary-section"><div class="usa-footer__primary-container grid-row"><div class="tablet:grid-col-3"><a class="usa-footer__primary-link" href="/"><img alt="CyberGeek logo" loading="lazy" width="142" height="26" decoding="async" data-nimg="1" style="color:transparent" src="/_next/static/media/CyberGeek-logo.8e9bbd2b.svg"/></a><p class="usa-footer__logo-heading display-none tablet-lg:display-block">The official website of the CMS Information Security and Privacy Group (ISPG)</p></div><div class="tablet:grid-col-12 tablet-lg:grid-col-9"><nav class="usa-footer__nav" aria-label="Footer navigation,"><ul class="grid-row grid-gap"><li class=" tablet:grid-col-3 desktop:grid-col-auto usa-footer__primary-content "><a class="usa-footer__primary-link" href="/learn/about-ispg-cybergeek">What is CyberGeek?</a></li><li class=" tablet:grid-col-3 desktop:grid-col-auto usa-footer__primary-content "><a class="usa-footer__primary-link" href="https://www.cms.gov/privacy">Privacy policy</a></li><li class=" tablet:grid-col-3 desktop:grid-col-auto usa-footer__primary-content "><a class="usa-footer__primary-link" href="https://www.cms.gov/about-cms/information-systems/privacy/vulnerability-disclosure-policy">CMS Vulnerability Disclosure Policy</a></li><li class=" tablet:grid-col-3 desktop:grid-col-auto usa-footer__primary-content "><a class="usa-footer__primary-link" href="https://www.cms.gov/About-CMS/Agency-Information/Aboutwebsite/Policiesforaccessibility">Accessibility</a></li></ul></nav></div></div></div><div class="usa-footer__secondary-section"><div class="grid-container"><div class="usa-footer__logo grid-row grid-gap-2"><div class="mobile-lg:grid-col-3"><a href="https://www.cms.gov/"><img alt="CMS homepage" loading="lazy" width="124" height="29" decoding="async" data-nimg="1" style="color:transparent" src="/_next/static/media/cmsLogo.10a64ce4.svg"/></a></div><div class="mobile-lg:grid-col-7"><p class="font-sans-3xs line-height-sans-3">A federal government website managed and paid for by the U.S. Centers for Medicare &amp; Medicaid Services.</p><address class="font-sans-3xs line-height-sans-3">7500 Security Boulevard, Baltimore, MD 21244</address></div></div></div></div></footer><script>(self.__next_s=self.__next_s||[]).push(["/assets/javascript/uswds.min.js",{}])</script><script src="/_next/static/chunks/webpack-182b67d00f496f9d.js" async=""></script><script>(self.__next_f=self.__next_f||[]).push([0]);self.__next_f.push([2,null])</script><script>self.__next_f.push([1,"1:HL[\"/_next/static/css/ef46db3751d8e999.css\",\"style\"]\n2:HL[\"/_next/static/css/0759e90f4fecfde7.css\",\"style\"]\n"])</script><script>self.__next_f.push([1,"3:I[5751,[],\"\"]\n6:I[9275,[],\"\"]\n8:I[1343,[],\"\"]\nb:I[6130,[],\"\"]\n7:[\"slug\",\"isso-mentorship-program\",\"d\"]\nc:[]\n0:[\"$\",\"$L3\",null,{\"buildId\":\"m9SaS4P6zugJbBHpXSk5Y\",\"assetPrefix\":\"\",\"urlParts\":[\"\",\"learn\",\"isso-mentorship-program\"],\"initialTree\":[\"\",{\"children\":[\"learn\",{\"children\":[[\"slug\",\"isso-mentorship-program\",\"d\"],{\"children\":[\"__PAGE__\",{}]}]}]},\"$undefined\",\"$undefined\",true],\"initialSeedData\":[\"\",{\"children\":[\"learn\",{\"children\":[[\"slug\",\"isso-mentorship-program\",\"d\"],{\"children\":[\"__PAGE__\",{},[[\"$L4\",\"$L5\",null],null],null]},[null,[\"$\",\"$L6\",null,{\"parallelRouterKey\":\"children\",\"segmentPath\":[\"children\",\"learn\",\"children\",\"$7\",\"children\"],\"error\":\"$undefined\",\"errorStyles\":\"$undefined\",\"errorScripts\":\"$undefined\",\"template\":[\"$\",\"$L8\",null,{}],\"templateStyles\":\"$undefined\",\"templateScripts\":\"$undefined\",\"notFound\":\"$undefined\",\"notFoundStyles\":\"$undefined\"}]],null]},[null,[\"$\",\"$L6\",null,{\"parallelRouterKey\":\"children\",\"segmentPath\":[\"children\",\"learn\",\"children\"],\"error\":\"$undefined\",\"errorStyles\":\"$undefined\",\"errorScripts\":\"$undefined\",\"template\":[\"$\",\"$L8\",null,{}],\"templateStyles\":\"$undefined\",\"templateScripts\":\"$undefined\",\"notFound\":\"$undefined\",\"notFoundStyles\":\"$undefined\"}]],null]},[[[[\"$\",\"link\",\"0\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/ef46db3751d8e999.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\"}],[\"$\",\"link\",\"1\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/0759e90f4fecfde7.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\"}]],\"$L9\"],null],null],\"couldBeIntercepted\":false,\"initialHead\":[null,\"$La\"],\"globalErrorComponent\":\"$b\",\"missingSlots\":\"$Wc\"}]\n"])</script><script>self.__next_f.push([1,"d:I[4080,[\"30\",\"static/chunks/30-49b1c1429d73281d.js\",\"317\",\"static/chunks/317-0f87feacc1712b2f.js\",\"223\",\"static/chunks/223-bc9ed43510898bbb.js\",\"185\",\"static/chunks/app/layout-9fc24027bc047aa2.js\"],\"\"]\ne:I[8173,[\"30\",\"static/chunks/30-49b1c1429d73281d.js\",\"317\",\"static/chunks/317-0f87feacc1712b2f.js\",\"972\",\"static/chunks/972-6e520d137ef194fb.js\",\"931\",\"static/chunks/app/page-cc829e051925e906.js\"],\"Image\"]\nf:I[7529,[\"30\",\"static/chunks/30-49b1c1429d73281d.js\",\"317\",\"static/chunks/317-0f87feacc1712b2f.js\",\"223\",\"static/chunks/223-bc9ed43510898bbb.js\",\"185\",\"static/chunks/app/layout-9fc24027bc047aa2.js\"],\"default\"]\n11:I[231,[\"30\",\"static/chunks/30-49b1c1429d73281d.js\",\"317\",\"static/chunks/317-0f87feacc1712b2f.js\",\"972\",\"static/chunks/972-6e520d137ef194fb.js\",\"931\",\"static/chunks/app/page-cc829e051925e906.js\"],\"\"]\n12:I[7303,[\"30\",\"static/chunks/30-49b1c1429d73281d.js\",\"317\",\"static/chunks/317-0f87feacc1712b2f.js\",\"223\",\"static/chunks/223-bc9ed43510898bbb.js\",\"185\",\"static/chunks/app/layout-9fc24027bc047aa2.js\"],\"default\"]\n13:I[8521,[\"489\",\"static/chunks/app/template-d264bab5e3061841.js\"],\"default\"]\n14:I[5922,[\"30\",\"static/chunks/30-49b1c1429d73281d.js\",\"317\",\"static/chunks/317-0f87feacc1712b2f.js\",\"972\",\"static/chunks/972-6e520d137ef194fb.js\",\"931\",\"static/chunks/app/page-cc829e051925e906.js\"],\"default\"]\n15:I[7182,[\"30\",\"static/chunks/30-49b1c1429d73281d.js\",\"317\",\"static/chunks/317-0f87feacc1712b2f.js\",\"223\",\"static/chunks/223-bc9ed43510898bbb.js\",\"185\",\"static/chunks/app/layout-9fc24027bc047aa2.js\"],\"default\"]\n16:I[4180,[\"30\",\"static/chunks/30-49b1c1429d73281d.js\",\"317\",\"static/chunks/317-0f87feacc1712b2f.js\",\"223\",\"static/chunks/223-bc9ed43510898bbb.js\",\"185\",\"static/chunks/app/layout-9fc24027bc047aa2.js\"],\"TealiumTagManager\"]\n10:Tdced,"])</script><script>self.__next_f.push([1,"{\"id\":\"mega-menu\",\"linkset\":{\"elements\":[{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Roles\",\"hierarchy\":[\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/information-system-security-officer-isso\",\"attributes\":{\"title\":\"Information System Security Officer (ISSO)\",\"hierarchy\":[\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-information-system-security-officer-isso-handbook\",\"attributes\":{\"title\":\"ISSO Handbook\",\"hierarchy\":[\"0\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-information-system-security-officer-isso-handbook#getting-started-for-new-issos\",\"attributes\":{\"title\":\"Getting started (for new ISSOs)\",\"hierarchy\":[\"0\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/isso-mentorship-program\",\"attributes\":{\"title\":\"ISSO Mentorship Program\",\"hierarchy\":[\"0\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-information-system-security-officer-isso-handbook#training\",\"attributes\":{\"title\":\"ISSO Training\",\"hierarchy\":[\"0\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/data-guardian\",\"attributes\":{\"title\":\"Data Guardian\",\"hierarchy\":[\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/data-guardian-handbook\",\"attributes\":{\"title\":\"Data Guardian Handbook\",\"hierarchy\":[\"0\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/cyber-risk-advisor-cra\",\"attributes\":{\"title\":\"Cyber Risk Advisor (CRA)\",\"hierarchy\":[\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-security-and-privacy-handbooks\",\"attributes\":{\"title\":\"CMS Security and Privacy Handbooks\",\"hierarchy\":[\"0\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-security-and-privacy-handbooks#risk-management-handbook-rmh-chapters\",\"attributes\":{\"title\":\"Risk Management Handbook (RMH)\",\"hierarchy\":[\"0\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/business-system-owner\",\"attributes\":{\"title\":\"Business / System Owner (BO/SO)\",\"hierarchy\":[\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cybersecurity-risk-assessment-program-csrap\",\"attributes\":{\"title\":\"Cybersecurity and Risk Assessment Program (CSRAP)\",\"hierarchy\":[\"0\",\"3\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-information-exchange-agreement-iea\",\"attributes\":{\"title\":\"Information Exchange Agreement (IEA)\",\"hierarchy\":[\"0\",\"3\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-computer-matching-agreement-cma\",\"attributes\":{\"title\":\"Computer Matching Agreement (CMA)\",\"hierarchy\":[\"0\",\"3\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/isso-service\",\"attributes\":{\"title\":\"ISSO As A Service\",\"hierarchy\":[\"0\",\"3\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Compliance \u0026 Authorization\",\"hierarchy\":[\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato\",\"attributes\":{\"title\":\"Authorization to Operate (ATO)\",\"hierarchy\":[\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato\",\"attributes\":{\"title\":\"About ATO at CMS\",\"hierarchy\":[\"1\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato#types-of-authorizations\",\"attributes\":{\"title\":\"Types of authorizations\",\"hierarchy\":[\"1\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato#ato-stakeholders\",\"attributes\":{\"title\":\"ATO stakeholders\",\"hierarchy\":[\"1\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato#related-documents-and-resources\",\"attributes\":{\"title\":\"ATO tools and resources\",\"hierarchy\":[\"1\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-technical-reference-architecture-tra\",\"attributes\":{\"title\":\"CMS Technical Reference Architecture (TRA)\",\"hierarchy\":[\"1\",\"0\",\"4\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/ongoing-authorization-oa\",\"attributes\":{\"title\":\"Ongoing Authorization (OA)\",\"hierarchy\":[\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/ongoing-authorization-oa\",\"attributes\":{\"title\":\"About OA at CMS\",\"hierarchy\":[\"1\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/ongoing-authorization-oa#is-my-system-eligible-for-oa\",\"attributes\":{\"title\":\"OA eligibility requirements\",\"hierarchy\":[\"1\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/continuous-diagnostics-and-mitigation-cdm\",\"attributes\":{\"title\":\"Continuous Diagnostics and Mitigation (CDM)\",\"hierarchy\":[\"1\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Assessments \u0026 Audits\",\"hierarchy\":[\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/penetration-testing-pentesting\",\"attributes\":{\"title\":\"Penetration Testing\",\"hierarchy\":[\"1\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cybersecurity-risk-assessment-program-csrap\",\"attributes\":{\"title\":\"Cybersecurity Risk Assessment Program (CSRAP)\",\"hierarchy\":[\"1\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/privacy-impact-assessment-pia\",\"attributes\":{\"title\":\"Privacy Impact Assessment (PIA)\",\"hierarchy\":[\"1\",\"2\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/security-impact-analysis-sia\",\"attributes\":{\"title\":\"Security Impact Analysis (SIA)\",\"hierarchy\":[\"1\",\"2\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/system-audits\",\"attributes\":{\"title\":\"System Audits\",\"hierarchy\":[\"1\",\"2\",\"4\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Policy \u0026 Guidance\",\"hierarchy\":[\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/cms-policies-and-guidance\",\"attributes\":{\"title\":\"CMS Policies and Guidance\",\"hierarchy\":[\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-acceptable-risk-safeguards-ars\",\"attributes\":{\"title\":\"CMS Acceptable Risk Safeguards (ARS)\",\"hierarchy\":[\"2\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-information-systems-security-privacy-policy-is2p2\",\"attributes\":{\"title\":\"CMS Information Security and Privacy Policy (IS2P2)\",\"hierarchy\":[\"2\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-security-and-privacy-handbooks\",\"attributes\":{\"title\":\"CMS Security and Privacy Handbooks\",\"hierarchy\":[\"2\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"https://security.cms.gov/learn/cms-risk-management-framework-rmf\",\"attributes\":{\"title\":\"CMS Risk Management Framework (RMF)\",\"hierarchy\":[\"2\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/email-encryption-requirements-cms\",\"attributes\":{\"title\":\"CMS Email Encryption\",\"hierarchy\":[\"2\",\"0\",\"4\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/federal-policies-and-guidance\",\"attributes\":{\"title\":\"Federal Policies and Guidance\",\"hierarchy\":[\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/national-institute-standards-and-technology-nist\",\"attributes\":{\"title\":\"National Institute of Standards and Technology (NIST)\",\"hierarchy\":[\"2\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/federal-information-security-modernization-act-fisma\",\"attributes\":{\"title\":\"Federal Information Security Modernization Act (FISMA)\",\"hierarchy\":[\"2\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/fedramp\",\"attributes\":{\"title\":\"Federal Risk and Authorization Management Program (FedRAMP)\",\"hierarchy\":[\"2\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/zero-trust\",\"attributes\":{\"title\":\"Zero Trust\",\"hierarchy\":[\"2\",\"1\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"System Security\",\"hierarchy\":[\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/application-security\",\"attributes\":{\"title\":\"Application Security\",\"hierarchy\":[\"3\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/threat-modeling\",\"attributes\":{\"title\":\"Threat Modeling\",\"hierarchy\":[\"3\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/zero-trust\",\"attributes\":{\"title\":\"Zero Trust\",\"hierarchy\":[\"3\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-cloud-services\",\"attributes\":{\"title\":\"CMS Cloud Services\",\"hierarchy\":[\"3\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/software-bill-materials-sbom\",\"attributes\":{\"title\":\"Software Bill of Materials (SBOM)\",\"hierarchy\":[\"3\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/security-operations\",\"attributes\":{\"title\":\"Security Operations\",\"hierarchy\":[\"3\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/risk-management-handbook-chapter-8-incident-response-ir\",\"attributes\":{\"title\":\"Incident Response\",\"hierarchy\":[\"3\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-cybersecurity-integration-center-ccic\",\"attributes\":{\"title\":\"CMS Cybersecurity Integration Center (CCIC)\",\"hierarchy\":[\"3\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/penetration-testing-pentesting\",\"attributes\":{\"title\":\"Penetration Testing\",\"hierarchy\":[\"3\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/risk-management-and-reporting\",\"attributes\":{\"title\":\"Risk Management and Reporting\",\"hierarchy\":[\"3\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/continuous-diagnostics-and-mitigation-cdm\",\"attributes\":{\"title\":\"Continuous Diagnostics and Mitigation (CDM)\",\"hierarchy\":[\"3\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cyber-risk-reports\",\"attributes\":{\"title\":\"Cyber Risk Reports\",\"hierarchy\":[\"3\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/plan-action-and-milestones-poam\",\"attributes\":{\"title\":\"Plan of Action and Milestones (POA\u0026M)\",\"hierarchy\":[\"3\",\"2\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Privacy\",\"hierarchy\":[\"4\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Agreements\",\"hierarchy\":[\"4\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-computer-matching-agreement-cma\",\"attributes\":{\"title\":\"Computer Matching Agreement (CMA)\",\"hierarchy\":[\"4\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-information-exchange-agreement-iea\",\"attributes\":{\"title\":\"Information Exchange Agreement (IEA)\",\"hierarchy\":[\"4\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Privacy Activities\",\"hierarchy\":[\"4\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/breach-response\",\"attributes\":{\"title\":\"Breach Response\",\"hierarchy\":[\"4\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/privacy-impact-assessment-pia\",\"attributes\":{\"title\":\"Privacy Impact Assessment (PIA)\",\"hierarchy\":[\"4\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/system-records-notice-sorn\",\"attributes\":{\"title\":\"System of Records Notice (SORN)\",\"hierarchy\":[\"4\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Privacy Resources\",\"hierarchy\":[\"4\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/privacy\",\"attributes\":{\"title\":\"Privacy at CMS\",\"hierarchy\":[\"4\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-breach-response-handbook\",\"attributes\":{\"title\":\"CMS Breach Response Handbook\",\"hierarchy\":[\"4\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/health-insurance-portability-and-accountability-act-1996-hipaa\",\"attributes\":{\"title\":\"Health Insurance Portability and Accessibility Act (HIPAA)\",\"hierarchy\":[\"4\",\"2\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-privacy-impact-assessment-pia-handbook\",\"attributes\":{\"title\":\"CMS Privacy Impact Assessment (PIA) Handbook\",\"hierarchy\":[\"4\",\"2\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Tools \u0026 Services\",\"hierarchy\":[\"5\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Reporting \u0026 Compliance\",\"hierarchy\":[\"5\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"https://security.cms.gov/learn/isso-service\",\"attributes\":{\"title\":\"ISSO As A Service\",\"hierarchy\":[\"5\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-fisma-continuous-tracking-system-cfacts\",\"attributes\":{\"title\":\"CFACTS\",\"hierarchy\":[\"5\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cyber-risk-reports\",\"attributes\":{\"title\":\"Cyber Risk Reports and Dashboards\",\"hierarchy\":[\"5\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/continuous-diagnostics-and-mitigation-cdm\",\"attributes\":{\"title\":\"Continuous Diagnostics and Mitigation (CDM)\",\"hierarchy\":[\"5\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"System Security\",\"hierarchy\":[\"5\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/threat-modeling\",\"attributes\":{\"title\":\"Threat Modeling\",\"hierarchy\":[\"5\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-cloud-services\",\"attributes\":{\"title\":\"CMS Cloud Services\",\"hierarchy\":[\"5\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-cybersecurity-integration-center-ccic\",\"attributes\":{\"title\":\"CMS Cybersecurity Integration Center (CCIC)\",\"hierarchy\":[\"5\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"https://security.cms.gov/learn/cms-security-data-lake-sdl\",\"attributes\":{\"title\":\"CMS Security Data Lake (SDL)\",\"hierarchy\":[\"5\",\"1\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Tests \u0026 Assessments\",\"hierarchy\":[\"5\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cybersecurity-risk-assessment-program-csrap\",\"attributes\":{\"title\":\"Cybersecurity Risk Assessment Program (CSRAP)\",\"hierarchy\":[\"5\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/penetration-testing-pentesting\",\"attributes\":{\"title\":\"Penetration Testing\",\"hierarchy\":[\"5\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/privacy-impact-assessment-pia\",\"attributes\":{\"title\":\"Privacy Impact Assessment (PIA)\",\"hierarchy\":[\"5\",\"2\",\"2\"],\"machine-name\":[\"mega-menu\"]}}],\"size\":87},\"elements\":[{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Roles\",\"hierarchy\":[\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/information-system-security-officer-isso\",\"attributes\":{\"title\":\"Information System Security Officer (ISSO)\",\"hierarchy\":[\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-information-system-security-officer-isso-handbook\",\"attributes\":{\"title\":\"ISSO Handbook\",\"hierarchy\":[\"0\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-information-system-security-officer-isso-handbook#getting-started-for-new-issos\",\"attributes\":{\"title\":\"Getting started (for new ISSOs)\",\"hierarchy\":[\"0\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/isso-mentorship-program\",\"attributes\":{\"title\":\"ISSO Mentorship Program\",\"hierarchy\":[\"0\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-information-system-security-officer-isso-handbook#training\",\"attributes\":{\"title\":\"ISSO Training\",\"hierarchy\":[\"0\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/data-guardian\",\"attributes\":{\"title\":\"Data Guardian\",\"hierarchy\":[\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/data-guardian-handbook\",\"attributes\":{\"title\":\"Data Guardian Handbook\",\"hierarchy\":[\"0\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/cyber-risk-advisor-cra\",\"attributes\":{\"title\":\"Cyber Risk Advisor (CRA)\",\"hierarchy\":[\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-security-and-privacy-handbooks\",\"attributes\":{\"title\":\"CMS Security and Privacy Handbooks\",\"hierarchy\":[\"0\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-security-and-privacy-handbooks#risk-management-handbook-rmh-chapters\",\"attributes\":{\"title\":\"Risk Management Handbook (RMH)\",\"hierarchy\":[\"0\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/business-system-owner\",\"attributes\":{\"title\":\"Business / System Owner (BO/SO)\",\"hierarchy\":[\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cybersecurity-risk-assessment-program-csrap\",\"attributes\":{\"title\":\"Cybersecurity and Risk Assessment Program (CSRAP)\",\"hierarchy\":[\"0\",\"3\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-information-exchange-agreement-iea\",\"attributes\":{\"title\":\"Information Exchange Agreement (IEA)\",\"hierarchy\":[\"0\",\"3\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-computer-matching-agreement-cma\",\"attributes\":{\"title\":\"Computer Matching Agreement (CMA)\",\"hierarchy\":[\"0\",\"3\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/isso-service\",\"attributes\":{\"title\":\"ISSO As A Service\",\"hierarchy\":[\"0\",\"3\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Compliance \u0026 Authorization\",\"hierarchy\":[\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato\",\"attributes\":{\"title\":\"Authorization to Operate (ATO)\",\"hierarchy\":[\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato\",\"attributes\":{\"title\":\"About ATO at CMS\",\"hierarchy\":[\"1\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato#types-of-authorizations\",\"attributes\":{\"title\":\"Types of authorizations\",\"hierarchy\":[\"1\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato#ato-stakeholders\",\"attributes\":{\"title\":\"ATO stakeholders\",\"hierarchy\":[\"1\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato#related-documents-and-resources\",\"attributes\":{\"title\":\"ATO tools and resources\",\"hierarchy\":[\"1\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-technical-reference-architecture-tra\",\"attributes\":{\"title\":\"CMS Technical Reference Architecture (TRA)\",\"hierarchy\":[\"1\",\"0\",\"4\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/ongoing-authorization-oa\",\"attributes\":{\"title\":\"Ongoing Authorization (OA)\",\"hierarchy\":[\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/ongoing-authorization-oa\",\"attributes\":{\"title\":\"About OA at CMS\",\"hierarchy\":[\"1\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/ongoing-authorization-oa#is-my-system-eligible-for-oa\",\"attributes\":{\"title\":\"OA eligibility requirements\",\"hierarchy\":[\"1\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/continuous-diagnostics-and-mitigation-cdm\",\"attributes\":{\"title\":\"Continuous Diagnostics and Mitigation (CDM)\",\"hierarchy\":[\"1\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Assessments \u0026 Audits\",\"hierarchy\":[\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/penetration-testing-pentesting\",\"attributes\":{\"title\":\"Penetration Testing\",\"hierarchy\":[\"1\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cybersecurity-risk-assessment-program-csrap\",\"attributes\":{\"title\":\"Cybersecurity Risk Assessment Program (CSRAP)\",\"hierarchy\":[\"1\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/privacy-impact-assessment-pia\",\"attributes\":{\"title\":\"Privacy Impact Assessment (PIA)\",\"hierarchy\":[\"1\",\"2\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/security-impact-analysis-sia\",\"attributes\":{\"title\":\"Security Impact Analysis (SIA)\",\"hierarchy\":[\"1\",\"2\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/system-audits\",\"attributes\":{\"title\":\"System Audits\",\"hierarchy\":[\"1\",\"2\",\"4\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Policy \u0026 Guidance\",\"hierarchy\":[\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/cms-policies-and-guidance\",\"attributes\":{\"title\":\"CMS Policies and Guidance\",\"hierarchy\":[\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-acceptable-risk-safeguards-ars\",\"attributes\":{\"title\":\"CMS Acceptable Risk Safeguards (ARS)\",\"hierarchy\":[\"2\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-information-systems-security-privacy-policy-is2p2\",\"attributes\":{\"title\":\"CMS Information Security and Privacy Policy (IS2P2)\",\"hierarchy\":[\"2\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-security-and-privacy-handbooks\",\"attributes\":{\"title\":\"CMS Security and Privacy Handbooks\",\"hierarchy\":[\"2\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"https://security.cms.gov/learn/cms-risk-management-framework-rmf\",\"attributes\":{\"title\":\"CMS Risk Management Framework (RMF)\",\"hierarchy\":[\"2\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/email-encryption-requirements-cms\",\"attributes\":{\"title\":\"CMS Email Encryption\",\"hierarchy\":[\"2\",\"0\",\"4\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/federal-policies-and-guidance\",\"attributes\":{\"title\":\"Federal Policies and Guidance\",\"hierarchy\":[\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/national-institute-standards-and-technology-nist\",\"attributes\":{\"title\":\"National Institute of Standards and Technology (NIST)\",\"hierarchy\":[\"2\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/federal-information-security-modernization-act-fisma\",\"attributes\":{\"title\":\"Federal Information Security Modernization Act (FISMA)\",\"hierarchy\":[\"2\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/fedramp\",\"attributes\":{\"title\":\"Federal Risk and Authorization Management Program (FedRAMP)\",\"hierarchy\":[\"2\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/zero-trust\",\"attributes\":{\"title\":\"Zero Trust\",\"hierarchy\":[\"2\",\"1\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"System Security\",\"hierarchy\":[\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/application-security\",\"attributes\":{\"title\":\"Application Security\",\"hierarchy\":[\"3\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/threat-modeling\",\"attributes\":{\"title\":\"Threat Modeling\",\"hierarchy\":[\"3\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/zero-trust\",\"attributes\":{\"title\":\"Zero Trust\",\"hierarchy\":[\"3\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-cloud-services\",\"attributes\":{\"title\":\"CMS Cloud Services\",\"hierarchy\":[\"3\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/software-bill-materials-sbom\",\"attributes\":{\"title\":\"Software Bill of Materials (SBOM)\",\"hierarchy\":[\"3\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/security-operations\",\"attributes\":{\"title\":\"Security Operations\",\"hierarchy\":[\"3\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/risk-management-handbook-chapter-8-incident-response-ir\",\"attributes\":{\"title\":\"Incident Response\",\"hierarchy\":[\"3\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-cybersecurity-integration-center-ccic\",\"attributes\":{\"title\":\"CMS Cybersecurity Integration Center (CCIC)\",\"hierarchy\":[\"3\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/penetration-testing-pentesting\",\"attributes\":{\"title\":\"Penetration Testing\",\"hierarchy\":[\"3\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/risk-management-and-reporting\",\"attributes\":{\"title\":\"Risk Management and Reporting\",\"hierarchy\":[\"3\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/continuous-diagnostics-and-mitigation-cdm\",\"attributes\":{\"title\":\"Continuous Diagnostics and Mitigation (CDM)\",\"hierarchy\":[\"3\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cyber-risk-reports\",\"attributes\":{\"title\":\"Cyber Risk Reports\",\"hierarchy\":[\"3\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/plan-action-and-milestones-poam\",\"attributes\":{\"title\":\"Plan of Action and Milestones (POA\u0026M)\",\"hierarchy\":[\"3\",\"2\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Privacy\",\"hierarchy\":[\"4\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Agreements\",\"hierarchy\":[\"4\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-computer-matching-agreement-cma\",\"attributes\":{\"title\":\"Computer Matching Agreement (CMA)\",\"hierarchy\":[\"4\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-information-exchange-agreement-iea\",\"attributes\":{\"title\":\"Information Exchange Agreement (IEA)\",\"hierarchy\":[\"4\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Privacy Activities\",\"hierarchy\":[\"4\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/breach-response\",\"attributes\":{\"title\":\"Breach Response\",\"hierarchy\":[\"4\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/privacy-impact-assessment-pia\",\"attributes\":{\"title\":\"Privacy Impact Assessment (PIA)\",\"hierarchy\":[\"4\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/system-records-notice-sorn\",\"attributes\":{\"title\":\"System of Records Notice (SORN)\",\"hierarchy\":[\"4\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Privacy Resources\",\"hierarchy\":[\"4\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/privacy\",\"attributes\":{\"title\":\"Privacy at CMS\",\"hierarchy\":[\"4\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-breach-response-handbook\",\"attributes\":{\"title\":\"CMS Breach Response Handbook\",\"hierarchy\":[\"4\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/health-insurance-portability-and-accountability-act-1996-hipaa\",\"attributes\":{\"title\":\"Health Insurance Portability and Accessibility Act (HIPAA)\",\"hierarchy\":[\"4\",\"2\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-privacy-impact-assessment-pia-handbook\",\"attributes\":{\"title\":\"CMS Privacy Impact Assessment (PIA) Handbook\",\"hierarchy\":[\"4\",\"2\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Tools \u0026 Services\",\"hierarchy\":[\"5\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Reporting \u0026 Compliance\",\"hierarchy\":[\"5\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"https://security.cms.gov/learn/isso-service\",\"attributes\":{\"title\":\"ISSO As A Service\",\"hierarchy\":[\"5\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-fisma-continuous-tracking-system-cfacts\",\"attributes\":{\"title\":\"CFACTS\",\"hierarchy\":[\"5\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cyber-risk-reports\",\"attributes\":{\"title\":\"Cyber Risk Reports and Dashboards\",\"hierarchy\":[\"5\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/continuous-diagnostics-and-mitigation-cdm\",\"attributes\":{\"title\":\"Continuous Diagnostics and Mitigation (CDM)\",\"hierarchy\":[\"5\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"System Security\",\"hierarchy\":[\"5\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/threat-modeling\",\"attributes\":{\"title\":\"Threat Modeling\",\"hierarchy\":[\"5\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-cloud-services\",\"attributes\":{\"title\":\"CMS Cloud Services\",\"hierarchy\":[\"5\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-cybersecurity-integration-center-ccic\",\"attributes\":{\"title\":\"CMS Cybersecurity Integration Center (CCIC)\",\"hierarchy\":[\"5\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"https://security.cms.gov/learn/cms-security-data-lake-sdl\",\"attributes\":{\"title\":\"CMS Security Data Lake (SDL)\",\"hierarchy\":[\"5\",\"1\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Tests \u0026 Assessments\",\"hierarchy\":[\"5\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cybersecurity-risk-assessment-program-csrap\",\"attributes\":{\"title\":\"Cybersecurity Risk Assessment Program (CSRAP)\",\"hierarchy\":[\"5\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/penetration-testing-pentesting\",\"attributes\":{\"title\":\"Penetration Testing\",\"hierarchy\":[\"5\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/privacy-impact-assessment-pia\",\"attributes\":{\"title\":\"Privacy Impact Assessment (PIA)\",\"hierarchy\":[\"5\",\"2\",\"2\"],\"machine-name\":[\"mega-menu\"]}}],\"size\":87,\"tree\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Roles\",\"hierarchy\":[\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/information-system-security-officer-isso\",\"attributes\":{\"title\":\"Information System Security Officer (ISSO)\",\"hierarchy\":[\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-information-system-security-officer-isso-handbook\",\"attributes\":{\"title\":\"ISSO Handbook\",\"hierarchy\":[\"0\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-information-system-security-officer-isso-handbook#getting-started-for-new-issos\",\"attributes\":{\"title\":\"Getting started (for new ISSOs)\",\"hierarchy\":[\"0\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/isso-mentorship-program\",\"attributes\":{\"title\":\"ISSO Mentorship Program\",\"hierarchy\":[\"0\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-information-system-security-officer-isso-handbook#training\",\"attributes\":{\"title\":\"ISSO Training\",\"hierarchy\":[\"0\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/data-guardian\",\"attributes\":{\"title\":\"Data Guardian\",\"hierarchy\":[\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/data-guardian-handbook\",\"attributes\":{\"title\":\"Data Guardian Handbook\",\"hierarchy\":[\"0\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/cyber-risk-advisor-cra\",\"attributes\":{\"title\":\"Cyber Risk Advisor (CRA)\",\"hierarchy\":[\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-security-and-privacy-handbooks\",\"attributes\":{\"title\":\"CMS Security and Privacy Handbooks\",\"hierarchy\":[\"0\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-security-and-privacy-handbooks#risk-management-handbook-rmh-chapters\",\"attributes\":{\"title\":\"Risk Management Handbook (RMH)\",\"hierarchy\":[\"0\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/business-system-owner\",\"attributes\":{\"title\":\"Business / System Owner (BO/SO)\",\"hierarchy\":[\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cybersecurity-risk-assessment-program-csrap\",\"attributes\":{\"title\":\"Cybersecurity and Risk Assessment Program (CSRAP)\",\"hierarchy\":[\"0\",\"3\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-information-exchange-agreement-iea\",\"attributes\":{\"title\":\"Information Exchange Agreement (IEA)\",\"hierarchy\":[\"0\",\"3\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-computer-matching-agreement-cma\",\"attributes\":{\"title\":\"Computer Matching Agreement (CMA)\",\"hierarchy\":[\"0\",\"3\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/isso-service\",\"attributes\":{\"title\":\"ISSO As A Service\",\"hierarchy\":[\"0\",\"3\",\"3\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Compliance \u0026 Authorization\",\"hierarchy\":[\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato\",\"attributes\":{\"title\":\"Authorization to Operate (ATO)\",\"hierarchy\":[\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato\",\"attributes\":{\"title\":\"About ATO at CMS\",\"hierarchy\":[\"1\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato#types-of-authorizations\",\"attributes\":{\"title\":\"Types of authorizations\",\"hierarchy\":[\"1\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato#ato-stakeholders\",\"attributes\":{\"title\":\"ATO stakeholders\",\"hierarchy\":[\"1\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato#related-documents-and-resources\",\"attributes\":{\"title\":\"ATO tools and resources\",\"hierarchy\":[\"1\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-technical-reference-architecture-tra\",\"attributes\":{\"title\":\"CMS Technical Reference Architecture (TRA)\",\"hierarchy\":[\"1\",\"0\",\"4\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/ongoing-authorization-oa\",\"attributes\":{\"title\":\"Ongoing Authorization (OA)\",\"hierarchy\":[\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/ongoing-authorization-oa\",\"attributes\":{\"title\":\"About OA at CMS\",\"hierarchy\":[\"1\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/ongoing-authorization-oa#is-my-system-eligible-for-oa\",\"attributes\":{\"title\":\"OA eligibility requirements\",\"hierarchy\":[\"1\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/continuous-diagnostics-and-mitigation-cdm\",\"attributes\":{\"title\":\"Continuous Diagnostics and Mitigation (CDM)\",\"hierarchy\":[\"1\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Assessments \u0026 Audits\",\"hierarchy\":[\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/penetration-testing-pentesting\",\"attributes\":{\"title\":\"Penetration Testing\",\"hierarchy\":[\"1\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cybersecurity-risk-assessment-program-csrap\",\"attributes\":{\"title\":\"Cybersecurity Risk Assessment Program (CSRAP)\",\"hierarchy\":[\"1\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/privacy-impact-assessment-pia\",\"attributes\":{\"title\":\"Privacy Impact Assessment (PIA)\",\"hierarchy\":[\"1\",\"2\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/security-impact-analysis-sia\",\"attributes\":{\"title\":\"Security Impact Analysis (SIA)\",\"hierarchy\":[\"1\",\"2\",\"3\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/system-audits\",\"attributes\":{\"title\":\"System Audits\",\"hierarchy\":[\"1\",\"2\",\"4\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Policy \u0026 Guidance\",\"hierarchy\":[\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/cms-policies-and-guidance\",\"attributes\":{\"title\":\"CMS Policies and Guidance\",\"hierarchy\":[\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-acceptable-risk-safeguards-ars\",\"attributes\":{\"title\":\"CMS Acceptable Risk Safeguards (ARS)\",\"hierarchy\":[\"2\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-information-systems-security-privacy-policy-is2p2\",\"attributes\":{\"title\":\"CMS Information Security and Privacy Policy (IS2P2)\",\"hierarchy\":[\"2\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-security-and-privacy-handbooks\",\"attributes\":{\"title\":\"CMS Security and Privacy Handbooks\",\"hierarchy\":[\"2\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"https://security.cms.gov/learn/cms-risk-management-framework-rmf\",\"attributes\":{\"title\":\"CMS Risk Management Framework (RMF)\",\"hierarchy\":[\"2\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/email-encryption-requirements-cms\",\"attributes\":{\"title\":\"CMS Email Encryption\",\"hierarchy\":[\"2\",\"0\",\"4\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/federal-policies-and-guidance\",\"attributes\":{\"title\":\"Federal Policies and Guidance\",\"hierarchy\":[\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/national-institute-standards-and-technology-nist\",\"attributes\":{\"title\":\"National Institute of Standards and Technology (NIST)\",\"hierarchy\":[\"2\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/federal-information-security-modernization-act-fisma\",\"attributes\":{\"title\":\"Federal Information Security Modernization Act (FISMA)\",\"hierarchy\":[\"2\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/fedramp\",\"attributes\":{\"title\":\"Federal Risk and Authorization Management Program (FedRAMP)\",\"hierarchy\":[\"2\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/zero-trust\",\"attributes\":{\"title\":\"Zero Trust\",\"hierarchy\":[\"2\",\"1\",\"3\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"System Security\",\"hierarchy\":[\"3\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/application-security\",\"attributes\":{\"title\":\"Application Security\",\"hierarchy\":[\"3\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/threat-modeling\",\"attributes\":{\"title\":\"Threat Modeling\",\"hierarchy\":[\"3\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/zero-trust\",\"attributes\":{\"title\":\"Zero Trust\",\"hierarchy\":[\"3\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-cloud-services\",\"attributes\":{\"title\":\"CMS Cloud Services\",\"hierarchy\":[\"3\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/software-bill-materials-sbom\",\"attributes\":{\"title\":\"Software Bill of Materials (SBOM)\",\"hierarchy\":[\"3\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/security-operations\",\"attributes\":{\"title\":\"Security Operations\",\"hierarchy\":[\"3\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/risk-management-handbook-chapter-8-incident-response-ir\",\"attributes\":{\"title\":\"Incident Response\",\"hierarchy\":[\"3\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-cybersecurity-integration-center-ccic\",\"attributes\":{\"title\":\"CMS Cybersecurity Integration Center (CCIC)\",\"hierarchy\":[\"3\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/penetration-testing-pentesting\",\"attributes\":{\"title\":\"Penetration Testing\",\"hierarchy\":[\"3\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/risk-management-and-reporting\",\"attributes\":{\"title\":\"Risk Management and Reporting\",\"hierarchy\":[\"3\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/continuous-diagnostics-and-mitigation-cdm\",\"attributes\":{\"title\":\"Continuous Diagnostics and Mitigation (CDM)\",\"hierarchy\":[\"3\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cyber-risk-reports\",\"attributes\":{\"title\":\"Cyber Risk Reports\",\"hierarchy\":[\"3\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/plan-action-and-milestones-poam\",\"attributes\":{\"title\":\"Plan of Action and Milestones (POA\u0026M)\",\"hierarchy\":[\"3\",\"2\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Privacy\",\"hierarchy\":[\"4\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Agreements\",\"hierarchy\":[\"4\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-computer-matching-agreement-cma\",\"attributes\":{\"title\":\"Computer Matching Agreement (CMA)\",\"hierarchy\":[\"4\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-information-exchange-agreement-iea\",\"attributes\":{\"title\":\"Information Exchange Agreement (IEA)\",\"hierarchy\":[\"4\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Privacy Activities\",\"hierarchy\":[\"4\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/breach-response\",\"attributes\":{\"title\":\"Breach Response\",\"hierarchy\":[\"4\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/privacy-impact-assessment-pia\",\"attributes\":{\"title\":\"Privacy Impact Assessment (PIA)\",\"hierarchy\":[\"4\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/system-records-notice-sorn\",\"attributes\":{\"title\":\"System of Records Notice (SORN)\",\"hierarchy\":[\"4\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Privacy Resources\",\"hierarchy\":[\"4\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/privacy\",\"attributes\":{\"title\":\"Privacy at CMS\",\"hierarchy\":[\"4\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-breach-response-handbook\",\"attributes\":{\"title\":\"CMS Breach Response Handbook\",\"hierarchy\":[\"4\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/health-insurance-portability-and-accountability-act-1996-hipaa\",\"attributes\":{\"title\":\"Health Insurance Portability and Accessibility Act (HIPAA)\",\"hierarchy\":[\"4\",\"2\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-privacy-impact-assessment-pia-handbook\",\"attributes\":{\"title\":\"CMS Privacy Impact Assessment (PIA) Handbook\",\"hierarchy\":[\"4\",\"2\",\"3\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Tools \u0026 Services\",\"hierarchy\":[\"5\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Reporting \u0026 Compliance\",\"hierarchy\":[\"5\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"https://security.cms.gov/learn/isso-service\",\"attributes\":{\"title\":\"ISSO As A Service\",\"hierarchy\":[\"5\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-fisma-continuous-tracking-system-cfacts\",\"attributes\":{\"title\":\"CFACTS\",\"hierarchy\":[\"5\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cyber-risk-reports\",\"attributes\":{\"title\":\"Cyber Risk Reports and Dashboards\",\"hierarchy\":[\"5\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/continuous-diagnostics-and-mitigation-cdm\",\"attributes\":{\"title\":\"Continuous Diagnostics and Mitigation (CDM)\",\"hierarchy\":[\"5\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"System Security\",\"hierarchy\":[\"5\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/threat-modeling\",\"attributes\":{\"title\":\"Threat Modeling\",\"hierarchy\":[\"5\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-cloud-services\",\"attributes\":{\"title\":\"CMS Cloud Services\",\"hierarchy\":[\"5\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-cybersecurity-integration-center-ccic\",\"attributes\":{\"title\":\"CMS Cybersecurity Integration Center (CCIC)\",\"hierarchy\":[\"5\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"https://security.cms.gov/learn/cms-security-data-lake-sdl\",\"attributes\":{\"title\":\"CMS Security Data Lake (SDL)\",\"hierarchy\":[\"5\",\"1\",\"3\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Tests \u0026 Assessments\",\"hierarchy\":[\"5\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cybersecurity-risk-assessment-program-csrap\",\"attributes\":{\"title\":\"Cybersecurity Risk Assessment Program (CSRAP)\",\"hierarchy\":[\"5\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/penetration-testing-pentesting\",\"attributes\":{\"title\":\"Penetration Testing\",\"hierarchy\":[\"5\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/privacy-impact-assessment-pia\",\"attributes\":{\"title\":\"Privacy Impact Assessment (PIA)\",\"hierarchy\":[\"5\",\"2\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]}]}]}"])</script><script>self.__next_f.push([1,"9:[\"$\",\"html\",null,{\"lang\":\"en\",\"children\":[[\"$\",\"head\",null,{\"children\":[\"$\",\"$Ld\",null,{\"src\":\"/assets/javascript/uswds-init.min.js\",\"strategy\":\"beforeInteractive\"}]}],[\"$\",\"body\",null,{\"children\":[[[\"$\",\"a\",null,{\"className\":\"usa-skipnav\",\"href\":\"#main\",\"children\":\"Skip to main content\"}],[\"$\",\"section\",null,{\"className\":\"usa-banner\",\"aria-label\":\"Official website of the United States government\",\"children\":[\"$\",\"div\",null,{\"className\":\"usa-accordion\",\"children\":[[\"$\",\"header\",null,{\"className\":\"usa-banner__header\",\"children\":[\"$\",\"div\",null,{\"className\":\"usa-banner__inner\",\"children\":[[\"$\",\"div\",null,{\"className\":\"grid-col-auto\",\"children\":[\"$\",\"$Le\",null,{\"aria-hidden\":\"true\",\"className\":\"usa-banner__header-flag\",\"src\":\"/assets/img/us_flag_small.png\",\"alt\":\"\",\"width\":\"16\",\"height\":\"11\"}]}],[\"$\",\"div\",null,{\"className\":\"grid-col-fill tablet:grid-col-auto\",\"aria-hidden\":\"true\",\"children\":[[\"$\",\"p\",null,{\"className\":\"usa-banner__header-text\",\"children\":\"An official website of the United States government\"}],[\"$\",\"p\",null,{\"className\":\"usa-banner__header-action\",\"children\":\"Here's how you know\"}]]}],[\"$\",\"button\",null,{\"type\":\"button\",\"className\":\"usa-accordion__button usa-banner__button\",\"aria-expanded\":\"false\",\"aria-controls\":\"gov-banner-default-default\",\"children\":[\"$\",\"span\",null,{\"className\":\"usa-banner__button-text\",\"children\":\"Here's how you know\"}]}]]}]}],[\"$\",\"div\",null,{\"className\":\"usa-banner__content usa-accordion__content\",\"id\":\"gov-banner-default-default\",\"hidden\":true,\"children\":[\"$\",\"div\",null,{\"className\":\"grid-row grid-gap-lg\",\"children\":[[\"$\",\"div\",null,{\"className\":\"usa-banner__guidance tablet:grid-col-6\",\"children\":[[\"$\",\"$Le\",null,{\"className\":\"usa-banner__icon usa-media-block__img\",\"src\":{\"src\":\"/_next/static/media/icon-dot-gov.3e9cb1b5.svg\",\"height\":64,\"width\":64,\"blurWidth\":0,\"blurHeight\":0},\"role\":\"img\",\"alt\":\"\",\"aria-hidden\":\"true\",\"width\":\"40\",\"height\":\"40\"}],[\"$\",\"div\",null,{\"className\":\"usa-media-block__body\",\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"strong\",null,{\"children\":\"Official websites use .gov\"}],[\"$\",\"br\",null,{}],\"A \",[\"$\",\"strong\",null,{\"children\":\".gov\"}],\" website belongs to an official government organization in the United States.\"]}]}]]}],[\"$\",\"div\",null,{\"className\":\"usa-banner__guidance tablet:grid-col-6\",\"children\":[[\"$\",\"$Le\",null,{\"className\":\"usa-banner__icon usa-media-block__img\",\"src\":{\"src\":\"/_next/static/media/icon-https.e7f1a222.svg\",\"height\":64,\"width\":64,\"blurWidth\":0,\"blurHeight\":0},\"role\":\"img\",\"alt\":\"\",\"aria-hidden\":\"true\",\"width\":\"40\",\"height\":\"40\"}],[\"$\",\"div\",null,{\"className\":\"usa-media-block__body\",\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"strong\",null,{\"children\":\"Secure .gov websites use HTTPS\"}],[\"$\",\"br\",null,{}],\"A \",[\"$\",\"strong\",null,{\"children\":\"lock\"}],\" (\",[\"$\",\"span\",null,{\"className\":\"icon-lock\",\"children\":[\"$\",\"svg\",null,{\"xmlns\":\"http://www.w3.org/2000/svg\",\"width\":\"52\",\"height\":\"64\",\"viewBox\":\"0 0 52 64\",\"className\":\"usa-banner__lock-image\",\"role\":\"img\",\"aria-labelledby\":\"banner-lock-description-default\",\"focusable\":\"false\",\"children\":[[\"$\",\"title\",null,{\"id\":\"banner-lock-title-default\",\"children\":\"Lock\"}],[\"$\",\"desc\",null,{\"id\":\"banner-lock-description-default\",\"children\":\"Locked padlock icon\"}],[\"$\",\"path\",null,{\"fill\":\"#000000\",\"fillRule\":\"evenodd\",\"d\":\"M26 0c10.493 0 19 8.507 19 19v9h3a4 4 0 0 1 4 4v28a4 4 0 0 1-4 4H4a4 4 0 0 1-4-4V32a4 4 0 0 1 4-4h3v-9C7 8.507 15.507 0 26 0zm0 8c-5.979 0-10.843 4.77-10.996 10.712L15 19v9h22v-9c0-6.075-4.925-11-11-11z\"}]]}]}],\") or \",[\"$\",\"strong\",null,{\"children\":\"https://\"}],\" means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.\"]}]}]]}]]}]}]]}]}]],[\"$\",\"$Lf\",null,{\"value\":\"$10\",\"children\":[[\"$\",\"div\",null,{\"className\":\"usa-overlay\"}],[\"$\",\"header\",null,{\"className\":\"usa-header usa-header--extended\",\"children\":[[\"$\",\"div\",null,{\"className\":\"bg-primary-dark\",\"children\":[\"$\",\"div\",null,{\"className\":\"usa-navbar\",\"children\":[[\"$\",\"div\",null,{\"className\":\"usa-logo padding-y-4 padding-right-3\",\"id\":\"CyberGeek-logo\",\"children\":[\"$\",\"$L11\",null,{\"href\":\"/\",\"title\":\"CMS CyberGeek Home\",\"children\":[\"$\",\"$Le\",null,{\"src\":{\"src\":\"/_next/static/media/CyberGeek-logo.8e9bbd2b.svg\",\"height\":50,\"width\":425,\"blurWidth\":0,\"blurHeight\":0},\"alt\":\"CyberGeek logo\",\"width\":\"298\",\"height\":\"35\",\"priority\":true}]}]}],[\"$\",\"button\",null,{\"aria-label\":\"Open menu\",\"type\":\"button\",\"className\":\"usa-menu-btn\",\"data-cy\":\"menu-button\",\"children\":\"Menu\"}]]}]}],[\"$\",\"$L12\",null,{}]]}]]}],[\"$\",\"main\",null,{\"id\":\"main\",\"children\":[\"$\",\"$L6\",null,{\"parallelRouterKey\":\"children\",\"segmentPath\":[\"children\"],\"error\":\"$undefined\",\"errorStyles\":\"$undefined\",\"errorScripts\":\"$undefined\",\"template\":[\"$\",\"$L13\",null,{\"children\":[\"$\",\"$L8\",null,{}]}],\"templateStyles\":[],\"templateScripts\":[],\"notFound\":[\"$\",\"section\",null,{\"className\":\"hero hero--theme-content-not-found undefined\",\"children\":[[\"$\",\"$Le\",null,{\"alt\":\"404 page not found\",\"className\":\"hero__graphic\",\"priority\":true,\"src\":{\"src\":\"/_next/static/media/content-not-found-graphic.8f104f47.svg\",\"height\":551,\"width\":948,\"blurWidth\":0,\"blurHeight\":0}}],[\"$\",\"div\",null,{\"className\":\"maxw-widescreen margin-x-auto padding-x-2 desktop:padding-x-0 padding-top-4 padding-bottom-6 desktop:padding-y-7\",\"children\":[\"$\",\"div\",null,{\"className\":\"tablet:grid-container position-relative \",\"children\":[\"$\",\"div\",null,{\"className\":\"hero__row grid-row grid-gap\",\"children\":[[\"$\",\"div\",null,{\"className\":\"tablet:grid-col-5 widescreen:position-relative\",\"children\":[false,false]}],[\"$\",\"div\",null,{\"className\":\"hero__column tablet:grid-col-7 flow padding-bottom-2\",\"children\":[\"$undefined\",\"$undefined\",false,[\"$\",\"h1\",null,{\"className\":\"hero__heading margin-0 line-height-sans-3 desktop:line-height-sans-2\",\"children\":\"We can't find that page.\"}],\"$undefined\",\"$undefined\",false,[\"$\",\"div\",null,{\"children\":[[\"$\",\"div\",null,{\"className\":\"hero__description\",\"children\":[[\"The page you're looking for may have been moved or retired. You can\",\" \",[\"$\",\"$L11\",null,{\"href\":\"/\",\"children\":\"visit our home page\"}],\" or use the search box to find helpful resources.\"]]}],[\"$\",\"div\",null,{\"className\":\"margin-top-6 search-container\",\"children\":[\"$\",\"$L14\",null,{\"theme\":\"content-not-found\"}]}]]}],false]}],false,false]}]}]}]]}],\"notFoundStyles\":[]}]}],[\"$\",\"$L15\",null,{}],[\"$\",\"$L16\",null,{}],[\"$\",\"$Ld\",null,{\"src\":\"/assets/javascript/uswds.min.js\",\"strategy\":\"beforeInteractive\"}]]}]]}]\n"])</script><script>self.__next_f.push([1,"17:I[9461,[\"866\",\"static/chunks/e37a0b60-b74be3d42787b18d.js\",\"30\",\"static/chunks/30-49b1c1429d73281d.js\",\"317\",\"static/chunks/317-0f87feacc1712b2f.js\",\"904\",\"static/chunks/904-dbddf7494c3e6975.js\",\"972\",\"static/chunks/972-6e520d137ef194fb.js\",\"549\",\"static/chunks/549-c87c1c3bbacc319f.js\",\"192\",\"static/chunks/app/learn/%5Bslug%5D/page-5b91cdc45a95ebbe.js\"],\"default\"]\n18:T1d17,"])</script><script>self.__next_f.push([1,"\u003ch2\u003e\u003cstrong\u003eIs mentorship right for me?\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eIf you are an ISSO at CMS (either federal staff or contractor support), you are eligible for the program. There are many benefits to participating in mentorship as either a mentee or a mentor.\u003c/p\u003e\u003ch3\u003e\u003cstrong\u003eFor mentees\u003c/strong\u003e\u003c/h3\u003e\u003cp\u003eYou may want to consider participating \u003cstrong\u003eas a mentee\u003c/strong\u003e if:\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou are a new ISSO at CMS.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eWhether you are brand new to the role of Information System Security Officer or you are onboarding as a \u003ca href=\"https://cybergeek.cms.gov/learn/isso-service\"\u003eService ISSO\u003c/a\u003e, teaming up with an experienced CMS ISSO can smooth your orientation and help you gain confidence in your new role. Your mentor can point you to resources, teach you to use them effectively, and share tips about the CMS “way of doing things”.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou are dealing with an unfamiliar or challenging task.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eEven if youre not a new ISSO, the mentorship program offers an opportunity for bootstrap support on new or challenging projects. You can be paired with an experienced ISSO and benefit from their lessons learned whether that means getting support towards a long-term goal like \u003ca href=\"https://cybergeek.cms.gov/learn/authorization-operate-ato\"\u003eAuthorization to Operate (ATO)\u003c/a\u003e or focused assistance on a specific task.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou want to expand your skills as an ISSO.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eMentorship isnt just for onboarding or overcoming challenges. It can also be a tool for relationship building and professional development. You may choose to participate in the program to expand your skills and learn about new tools or practices. Having a trusted peer in your field can help you reach beyond your comfort zone and grow your career and network.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou are not an ISSO, but want to learn about the role.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eEven non-ISSOs can apply to be mentored, with approval from their supervisor and the ISSO Support Team. If you are thinking of transitioning to an ISSO role, mentorship provides an opportunity to get real-world insight and advice.\u003c/p\u003e\u003ch3\u003e\u003cstrong\u003eFor mentors\u003c/strong\u003e\u003c/h3\u003e\u003cp\u003eYou may want to consider participating \u003cstrong\u003eas a mentor\u003c/strong\u003e if:\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou enjoy helping others.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eWe encourage experienced ISSOs to consider the motto, “Pass it on!” Knowing that much of your current success is the result of others investment of time and energy in your life, you may want to pay that investment forward by helping someone else to grow and learn.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou want to expand your leadership skills.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eMentoring offers a way for experienced ISSOs to practice interpersonal skills such as active listening, establishing trust, and teaching by example. These skills are valued by employers and co-workers alike and are essential for advancing into leadership roles. Serving as a mentor also gives you a practical way to demonstrate your hard-earned expertise.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou care deeply about CMS security culture.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eInformation security and privacy at CMS are not just for compliance they are essential for building trust with our beneficiaries, customers, and the American public. Mentoring provides an opportunity to build a more knowledgeable ISSO workforce and advance security awareness at CMS, resulting in a stronger overall security posture for our FISMA systems.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou value self-reflection and continuous improvement.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eA growth mindset remains important even for experienced ISSOs. Mentoring a peer can motivate you to learn more about yourself and identify areas where you want to continue learning. In a healthy mentorship, the mentee will often have valuable insights for the mentor as well.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eHow it works\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eThe mentorship program is flexible and based on the specific needs of mentors and mentees. The ISSO Support Team works with interested individuals to find an appropriate partner for a mentorship engagement (based on the goals and desired outcomes of both parties). From there, the two ISSOs decide how they will work together and for how long.\u003c/p\u003e\u003ch3\u003e\u003cstrong\u003eWhat mentorship is not\u003c/strong\u003e\u003c/h3\u003e\u003cp\u003eWhile ISSO mentorship can bring valuable benefits to both of the people involved, its important to understand what the program is \u003cstrong\u003enot \u003c/strong\u003emeant to address.\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cstrong\u003eMentors dont complete work on behalf of mentees\u003c/strong\u003e. They can offer support, resources, and lessons learned but the mentee remains responsible for their own work.\u003c/li\u003e\u003cli\u003e\u0026nbsp;\u003cstrong\u003eMentorship is not Training.\u003c/strong\u003e Mentorship focuses on a personalized, long-term relationship with a more experienced individual providing guidance and support based on their experience, while training is a structured process of delivering specific knowledge and skills through a set curriculum, often in a group setting, with a more teacher-student dynamic.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eMentorship is not a shortcut\u003c/strong\u003e. While it will help mentees be more effective in their role, the mentorship itself requires an investment of time and energy. Its not an “easy fix” for challenges, but rather an opportunity for both people to grow their skills.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eThe mentor is not a manager. \u003c/strong\u003eThe mentee does not report to the mentor, and the mentor does not evaluate the mentee. Instead, they share and learn together in a structured yet flexible arrangement.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eMentorship is not a requirement.\u003c/strong\u003e The ISSO Mentorship Program is a completely voluntary though highly encouraged opportunity for growth and professional development.\u003c/li\u003e\u003c/ul\u003e\u003ch3\u003e\u003cstrong\u003eSuccessful ISSO mentorship at CMS\u003c/strong\u003e\u003c/h3\u003e\u003cp\u003eMentoring has proven to be a highly \u003ca href=\"https://www.govtech.com/blogs/lohrmann-on-cybersecurity/security-pros-need-a-mentor-heres-why-and-how.html\"\u003ebeneficial activity for cybersecurity professionals\u003c/a\u003e, but not everyone is familiar with how mentorships should work. To be successful in partnership with another ISSO, keep the following in mind:\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eMentoring is a two-way street.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eBoth mentors and mentees will benefit from a healthy mentoring partnership. They can both learn from one another regardless of age, background, or level of experience. Successful mentorships are built on mutual trust and willingness to learn. This doesnt mean the mentor and mentee must become friends, but they should have respect and appreciation for one other.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eMentees hold the most responsibility.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eIt may surprise you to learn that the mentor is not the primary driver of the partnership. In the ISSO Mentorship Program, mentees have the greater responsibility to set goals, schedule meetings, and prepare materials and questions in advance to make sure time is spent effectively. While both people can share some of these responsibilities, the mentee should consider themselves the main driver.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eIt's okay to end a mentorship that isn't working.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eNot all partnerships are an ideal match. This could be due to various factors such as logistical challenges, a shift in priorities for either party, or personality differences. Its important to communicate with clarity and empathy and be willing to amicably end the mentorship if its not working well. This is not a negative reflection on the mentor or mentee.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"19:T1d17,"])</script><script>self.__next_f.push([1,"\u003ch2\u003e\u003cstrong\u003eIs mentorship right for me?\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eIf you are an ISSO at CMS (either federal staff or contractor support), you are eligible for the program. There are many benefits to participating in mentorship as either a mentee or a mentor.\u003c/p\u003e\u003ch3\u003e\u003cstrong\u003eFor mentees\u003c/strong\u003e\u003c/h3\u003e\u003cp\u003eYou may want to consider participating \u003cstrong\u003eas a mentee\u003c/strong\u003e if:\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou are a new ISSO at CMS.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eWhether you are brand new to the role of Information System Security Officer or you are onboarding as a \u003ca href=\"https://cybergeek.cms.gov/learn/isso-service\"\u003eService ISSO\u003c/a\u003e, teaming up with an experienced CMS ISSO can smooth your orientation and help you gain confidence in your new role. Your mentor can point you to resources, teach you to use them effectively, and share tips about the CMS “way of doing things”.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou are dealing with an unfamiliar or challenging task.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eEven if youre not a new ISSO, the mentorship program offers an opportunity for bootstrap support on new or challenging projects. You can be paired with an experienced ISSO and benefit from their lessons learned whether that means getting support towards a long-term goal like \u003ca href=\"https://cybergeek.cms.gov/learn/authorization-operate-ato\"\u003eAuthorization to Operate (ATO)\u003c/a\u003e or focused assistance on a specific task.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou want to expand your skills as an ISSO.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eMentorship isnt just for onboarding or overcoming challenges. It can also be a tool for relationship building and professional development. You may choose to participate in the program to expand your skills and learn about new tools or practices. Having a trusted peer in your field can help you reach beyond your comfort zone and grow your career and network.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou are not an ISSO, but want to learn about the role.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eEven non-ISSOs can apply to be mentored, with approval from their supervisor and the ISSO Support Team. If you are thinking of transitioning to an ISSO role, mentorship provides an opportunity to get real-world insight and advice.\u003c/p\u003e\u003ch3\u003e\u003cstrong\u003eFor mentors\u003c/strong\u003e\u003c/h3\u003e\u003cp\u003eYou may want to consider participating \u003cstrong\u003eas a mentor\u003c/strong\u003e if:\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou enjoy helping others.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eWe encourage experienced ISSOs to consider the motto, “Pass it on!” Knowing that much of your current success is the result of others investment of time and energy in your life, you may want to pay that investment forward by helping someone else to grow and learn.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou want to expand your leadership skills.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eMentoring offers a way for experienced ISSOs to practice interpersonal skills such as active listening, establishing trust, and teaching by example. These skills are valued by employers and co-workers alike and are essential for advancing into leadership roles. Serving as a mentor also gives you a practical way to demonstrate your hard-earned expertise.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou care deeply about CMS security culture.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eInformation security and privacy at CMS are not just for compliance they are essential for building trust with our beneficiaries, customers, and the American public. Mentoring provides an opportunity to build a more knowledgeable ISSO workforce and advance security awareness at CMS, resulting in a stronger overall security posture for our FISMA systems.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou value self-reflection and continuous improvement.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eA growth mindset remains important even for experienced ISSOs. Mentoring a peer can motivate you to learn more about yourself and identify areas where you want to continue learning. In a healthy mentorship, the mentee will often have valuable insights for the mentor as well.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eHow it works\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eThe mentorship program is flexible and based on the specific needs of mentors and mentees. The ISSO Support Team works with interested individuals to find an appropriate partner for a mentorship engagement (based on the goals and desired outcomes of both parties). From there, the two ISSOs decide how they will work together and for how long.\u003c/p\u003e\u003ch3\u003e\u003cstrong\u003eWhat mentorship is not\u003c/strong\u003e\u003c/h3\u003e\u003cp\u003eWhile ISSO mentorship can bring valuable benefits to both of the people involved, its important to understand what the program is \u003cstrong\u003enot \u003c/strong\u003emeant to address.\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cstrong\u003eMentors dont complete work on behalf of mentees\u003c/strong\u003e. They can offer support, resources, and lessons learned but the mentee remains responsible for their own work.\u003c/li\u003e\u003cli\u003e\u0026nbsp;\u003cstrong\u003eMentorship is not Training.\u003c/strong\u003e Mentorship focuses on a personalized, long-term relationship with a more experienced individual providing guidance and support based on their experience, while training is a structured process of delivering specific knowledge and skills through a set curriculum, often in a group setting, with a more teacher-student dynamic.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eMentorship is not a shortcut\u003c/strong\u003e. While it will help mentees be more effective in their role, the mentorship itself requires an investment of time and energy. Its not an “easy fix” for challenges, but rather an opportunity for both people to grow their skills.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eThe mentor is not a manager. \u003c/strong\u003eThe mentee does not report to the mentor, and the mentor does not evaluate the mentee. Instead, they share and learn together in a structured yet flexible arrangement.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eMentorship is not a requirement.\u003c/strong\u003e The ISSO Mentorship Program is a completely voluntary though highly encouraged opportunity for growth and professional development.\u003c/li\u003e\u003c/ul\u003e\u003ch3\u003e\u003cstrong\u003eSuccessful ISSO mentorship at CMS\u003c/strong\u003e\u003c/h3\u003e\u003cp\u003eMentoring has proven to be a highly \u003ca href=\"https://www.govtech.com/blogs/lohrmann-on-cybersecurity/security-pros-need-a-mentor-heres-why-and-how.html\"\u003ebeneficial activity for cybersecurity professionals\u003c/a\u003e, but not everyone is familiar with how mentorships should work. To be successful in partnership with another ISSO, keep the following in mind:\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eMentoring is a two-way street.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eBoth mentors and mentees will benefit from a healthy mentoring partnership. They can both learn from one another regardless of age, background, or level of experience. Successful mentorships are built on mutual trust and willingness to learn. This doesnt mean the mentor and mentee must become friends, but they should have respect and appreciation for one other.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eMentees hold the most responsibility.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eIt may surprise you to learn that the mentor is not the primary driver of the partnership. In the ISSO Mentorship Program, mentees have the greater responsibility to set goals, schedule meetings, and prepare materials and questions in advance to make sure time is spent effectively. While both people can share some of these responsibilities, the mentee should consider themselves the main driver.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eIt's okay to end a mentorship that isn't working.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eNot all partnerships are an ideal match. This could be due to various factors such as logistical challenges, a shift in priorities for either party, or personality differences. Its important to communicate with clarity and empathy and be willing to amicably end the mentorship if its not working well. This is not a negative reflection on the mentor or mentee.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1a:T198a,"])</script><script>self.__next_f.push([1,"\u003ch2\u003e\u003cstrong\u003eTips for mentors\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eYou will be most successful as a mentor in the program if you:\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cstrong\u003eTeach by example. \u003c/strong\u003eRemember the mentee will take their cues from your actions (not only your words). Model the behaviors and work ethics that will help them succeed.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eShare about failures as well as successes. \u003c/strong\u003eYou as a mentor are not expected to be perfect. Sharing lessons learned from past failures will help your mentee avoid similar mistakes.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eKeep the mentee at the center. \u003c/strong\u003eWhile you as a mentor will definitely benefit from the partnership, remember that the mentees growth and learning is top priority.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eUse helpful frameworks\u003c/strong\u003e. While ad hoc conversations can be beneficial, your mentee might benefit from the use of structured frameworks such as \u003ca href=\"https://www.insala.com/blog/how-to-become-a-successful-mentor\"\u003eSMART goals and SWOT analysis\u003c/a\u003e.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eBe open to learning\u003c/strong\u003e. Mentors and not just mentees can expect to grow and learn from the partnership. Keep an open mind, and see what your mentee may be able to teach or show you.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eShare experiences instead of dictating actions.\u003c/strong\u003e You can explain how you handled a similar situation or make suggestions based on past lessons learned but try to let the mentee come to their own conclusions.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eBe a connector.\u003c/strong\u003e Your knowledge of people and resources at CMS are a treasure trove to your mentee. Point them to valuable tools like the \u003ca href=\"/policy-guidance/cms-information-system-security-officer-isso-handbook\"\u003eISSO Handbook\u003c/a\u003e and introduce them to more people they can learn from.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eBe honest.\u003c/strong\u003e Dont be afraid to challenge your mentee if their ideas or actions are headed off-course. Be kind but direct with your feedback so they can improve and hold themselves accountable to their goals.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eBe approachable and available\u003c/strong\u003e. Regular connection with your mentee is necessary for you to maintain a thriving relationship. While the two of you will decide together on meeting frequency, make sure they feel comfortable reaching out for guidance.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eAsk for help\u003c/strong\u003e. Even as the mentor, you can ask questions or get help anytime from the ISSO Support Team: \u003ca href=\"mailto:ISSO@cms.hhs.gov\"\u003eISSO@cms.hhs.gov\u003c/a\u003e. Please dont hesitate to reach out.\u003c/li\u003e\u003c/ul\u003e\u003ch2\u003e\u003cstrong\u003eTips for mentees\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eYou will be most successful as a mentee in the program if you:\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cstrong\u003eSet SMART goals\u003c/strong\u003e. Take time to document clear goals with specific outcomes \u003ca href=\"https://www.atlassian.com/blog/productivity/how-to-write-smart-goals\"\u003eSMART goals\u003c/a\u003e are \u003cem\u003eSpecific, Measurable, Achievable, Relevant, and Time-Bound\u003c/em\u003e. Make sure your goals for the mentorship are realistic, taking the availability and experience of your mentor into consideration.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eTake responsibility.\u003c/strong\u003e Your mentor can provide tools and advice, but you are ultimately responsible for your own growth and learning. Be an active and eager participant in the process. Take initiative and take notes!\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eTake appropriate risks.\u003c/strong\u003e Your mentor may help you stretch beyond your comfort zone and lean in to new opportunities. Appropriate risk-taking is excellent for growth. Dont be afraid to make mistakes as long as you learn from them.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eRespect your mentors time\u003c/strong\u003e. Remember your mentor is a volunteer, giving of their time to help you grow. Make the most of the time you have with them. Always come prepared with an agenda, and let them know well in advance if you need to reschedule.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eUnderstand your mentors limits.\u003c/strong\u003e Your mentor will help you as much as they can, but if you have a need they cant address because of limited time or lack of experience in a specific realm, they will point you to resources or other people who can help.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eGive helpful feedback\u003c/strong\u003e. Be honest about your needs and goals. Ask questions if theres something you dont understand. Your mentor cant read your mind, so let them know if theres something else they can do to help and when they are doing a great job!\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eInvest in the relationship\u003c/strong\u003e. Trust and mutual respect do not happen automatically when the mentorship begins. You can nurture the relationship by showing appreciation, communicating thoughtfully, and demonstrating a growth mindset.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eAsk for help\u003c/strong\u003e. Remember your mentor is there to support you, so ask questions when you have them. Regarding the mentorship itself, you can also ask questions or get help anytime from the ISSO Support Team: \u003ca href=\"mailto:ISSO@cms.hhs.gov\"\u003eISSO@cms.hhs.gov\u003c/a\u003e.\u003c/li\u003e\u003c/ul\u003e\u003ch2\u003e\u003cstrong\u003eISSO resources\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eFor anyone participating in the ISSO Mentorship Program, its important to have quick access to ISSO resources provided by CMS and other organizations.\u0026nbsp;\u003c/p\u003e\u003cp\u003eThe \u003ca href=\"/policy-guidance/cms-information-system-security-officer-isso-handbook\"\u003eCMS Information Systems Security Officer (ISSO) Handbook\u003c/a\u003e is the authoritative guide for everything a CMS ISSO needs. As a mentor or mentee, this handbook is your trusted tool to help you find useful information like:\u003c/p\u003e\u003cp\u003e\u003ca href=\"/policy-guidance/cms-information-system-security-officer-isso-handbook#getting-started-for-new-issos\"\u003e\u003cstrong\u003eTips for getting started\u003c/strong\u003e\u003c/a\u003e\u003cstrong\u003e -\u0026nbsp;\u003c/strong\u003eEverything a new ISSO needs for onboarding at CMS, including self-assessment, initial meetings, and goals for the first year.\u003c/p\u003e\u003cp\u003e\u003ca href=\"/policy-guidance/cms-information-system-security-officer-isso-handbook#role-responsibilities\"\u003e\u003cstrong\u003eRole and responsibilities\u003c/strong\u003e\u003c/a\u003e\u0026nbsp;-\u0026nbsp;Learn whats expected of an ISSO at CMS, and how to perform all required duties.\u003c/p\u003e\u003cp\u003e\u003ca href=\"/policy-guidance/cms-information-system-security-officer-isso-handbook#isso-toolkit\"\u003e\u003cstrong\u003eISSO toolkit\u003c/strong\u003e\u003c/a\u003e\u003cstrong\u003e\u0026nbsp;- \u003c/strong\u003eEverything you need to be successful as an ISSO, including helpful documents,\u0026nbsp;events, Slack channels, tools, and programs.\u003c/p\u003e\u003cp\u003e\u003ca href=\"/policy-guidance/cms-information-system-security-officer-isso-handbook#training\"\u003e\u003cstrong\u003eTraining opportunities\u003c/strong\u003e\u003c/a\u003e\u003cstrong\u003e -\u0026nbsp;\u003c/strong\u003eBrowse free training offerings from CMS and HHS to help ISSOs of all skill levels advance their knowledge and grow in their careers.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1b:T198a,"])</script><script>self.__next_f.push([1,"\u003ch2\u003e\u003cstrong\u003eTips for mentors\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eYou will be most successful as a mentor in the program if you:\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cstrong\u003eTeach by example. \u003c/strong\u003eRemember the mentee will take their cues from your actions (not only your words). Model the behaviors and work ethics that will help them succeed.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eShare about failures as well as successes. \u003c/strong\u003eYou as a mentor are not expected to be perfect. Sharing lessons learned from past failures will help your mentee avoid similar mistakes.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eKeep the mentee at the center. \u003c/strong\u003eWhile you as a mentor will definitely benefit from the partnership, remember that the mentees growth and learning is top priority.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eUse helpful frameworks\u003c/strong\u003e. While ad hoc conversations can be beneficial, your mentee might benefit from the use of structured frameworks such as \u003ca href=\"https://www.insala.com/blog/how-to-become-a-successful-mentor\"\u003eSMART goals and SWOT analysis\u003c/a\u003e.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eBe open to learning\u003c/strong\u003e. Mentors and not just mentees can expect to grow and learn from the partnership. Keep an open mind, and see what your mentee may be able to teach or show you.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eShare experiences instead of dictating actions.\u003c/strong\u003e You can explain how you handled a similar situation or make suggestions based on past lessons learned but try to let the mentee come to their own conclusions.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eBe a connector.\u003c/strong\u003e Your knowledge of people and resources at CMS are a treasure trove to your mentee. Point them to valuable tools like the \u003ca href=\"/policy-guidance/cms-information-system-security-officer-isso-handbook\"\u003eISSO Handbook\u003c/a\u003e and introduce them to more people they can learn from.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eBe honest.\u003c/strong\u003e Dont be afraid to challenge your mentee if their ideas or actions are headed off-course. Be kind but direct with your feedback so they can improve and hold themselves accountable to their goals.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eBe approachable and available\u003c/strong\u003e. Regular connection with your mentee is necessary for you to maintain a thriving relationship. While the two of you will decide together on meeting frequency, make sure they feel comfortable reaching out for guidance.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eAsk for help\u003c/strong\u003e. Even as the mentor, you can ask questions or get help anytime from the ISSO Support Team: \u003ca href=\"mailto:ISSO@cms.hhs.gov\"\u003eISSO@cms.hhs.gov\u003c/a\u003e. Please dont hesitate to reach out.\u003c/li\u003e\u003c/ul\u003e\u003ch2\u003e\u003cstrong\u003eTips for mentees\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eYou will be most successful as a mentee in the program if you:\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cstrong\u003eSet SMART goals\u003c/strong\u003e. Take time to document clear goals with specific outcomes \u003ca href=\"https://www.atlassian.com/blog/productivity/how-to-write-smart-goals\"\u003eSMART goals\u003c/a\u003e are \u003cem\u003eSpecific, Measurable, Achievable, Relevant, and Time-Bound\u003c/em\u003e. Make sure your goals for the mentorship are realistic, taking the availability and experience of your mentor into consideration.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eTake responsibility.\u003c/strong\u003e Your mentor can provide tools and advice, but you are ultimately responsible for your own growth and learning. Be an active and eager participant in the process. Take initiative and take notes!\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eTake appropriate risks.\u003c/strong\u003e Your mentor may help you stretch beyond your comfort zone and lean in to new opportunities. Appropriate risk-taking is excellent for growth. Dont be afraid to make mistakes as long as you learn from them.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eRespect your mentors time\u003c/strong\u003e. Remember your mentor is a volunteer, giving of their time to help you grow. Make the most of the time you have with them. Always come prepared with an agenda, and let them know well in advance if you need to reschedule.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eUnderstand your mentors limits.\u003c/strong\u003e Your mentor will help you as much as they can, but if you have a need they cant address because of limited time or lack of experience in a specific realm, they will point you to resources or other people who can help.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eGive helpful feedback\u003c/strong\u003e. Be honest about your needs and goals. Ask questions if theres something you dont understand. Your mentor cant read your mind, so let them know if theres something else they can do to help and when they are doing a great job!\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eInvest in the relationship\u003c/strong\u003e. Trust and mutual respect do not happen automatically when the mentorship begins. You can nurture the relationship by showing appreciation, communicating thoughtfully, and demonstrating a growth mindset.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eAsk for help\u003c/strong\u003e. Remember your mentor is there to support you, so ask questions when you have them. Regarding the mentorship itself, you can also ask questions or get help anytime from the ISSO Support Team: \u003ca href=\"mailto:ISSO@cms.hhs.gov\"\u003eISSO@cms.hhs.gov\u003c/a\u003e.\u003c/li\u003e\u003c/ul\u003e\u003ch2\u003e\u003cstrong\u003eISSO resources\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eFor anyone participating in the ISSO Mentorship Program, its important to have quick access to ISSO resources provided by CMS and other organizations.\u0026nbsp;\u003c/p\u003e\u003cp\u003eThe \u003ca href=\"/policy-guidance/cms-information-system-security-officer-isso-handbook\"\u003eCMS Information Systems Security Officer (ISSO) Handbook\u003c/a\u003e is the authoritative guide for everything a CMS ISSO needs. As a mentor or mentee, this handbook is your trusted tool to help you find useful information like:\u003c/p\u003e\u003cp\u003e\u003ca href=\"/policy-guidance/cms-information-system-security-officer-isso-handbook#getting-started-for-new-issos\"\u003e\u003cstrong\u003eTips for getting started\u003c/strong\u003e\u003c/a\u003e\u003cstrong\u003e -\u0026nbsp;\u003c/strong\u003eEverything a new ISSO needs for onboarding at CMS, including self-assessment, initial meetings, and goals for the first year.\u003c/p\u003e\u003cp\u003e\u003ca href=\"/policy-guidance/cms-information-system-security-officer-isso-handbook#role-responsibilities\"\u003e\u003cstrong\u003eRole and responsibilities\u003c/strong\u003e\u003c/a\u003e\u0026nbsp;-\u0026nbsp;Learn whats expected of an ISSO at CMS, and how to perform all required duties.\u003c/p\u003e\u003cp\u003e\u003ca href=\"/policy-guidance/cms-information-system-security-officer-isso-handbook#isso-toolkit\"\u003e\u003cstrong\u003eISSO toolkit\u003c/strong\u003e\u003c/a\u003e\u003cstrong\u003e\u0026nbsp;- \u003c/strong\u003eEverything you need to be successful as an ISSO, including helpful documents,\u0026nbsp;events, Slack channels, tools, and programs.\u003c/p\u003e\u003cp\u003e\u003ca href=\"/policy-guidance/cms-information-system-security-officer-isso-handbook#training\"\u003e\u003cstrong\u003eTraining opportunities\u003c/strong\u003e\u003c/a\u003e\u003cstrong\u003e -\u0026nbsp;\u003c/strong\u003eBrowse free training offerings from CMS and HHS to help ISSOs of all skill levels advance their knowledge and grow in their careers.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1e:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node_type/node_type/d185e460-4998-4d2b-85cb-b04f304dfb1b\"}\n1d:{\"self\":\"$1e\"}\n21:[\"menu_ui\",\"scheduler\"]\n20:{\"module\":\"$21\"}\n24:[]\n23:{\"available_menus\":\"$24\",\"parent\":\"\"}\n25:{\"expand_fieldset\":\"when_required\",\"fields_display_mode\":\"vertical_tab\",\"publish_enable\":false,\"publish_past_date\":\"error\",\"publish_past_date_created\":false,\"publish_required\":false,\"publish_revision\":false,\"publish_touch\":false,\"show_message_after_update\":true,\"unpublish_enable\":false,\"unpublish_required\":false,\"unpublish_revision\":false}\n22:{\"menu_ui\":\"$23\",\"scheduler\":\"$25\"}\n1f:{\"langcode\":\"en\",\"status\":true,\"dependencies\":\"$20\",\"third_party_settings\":\"$22\",\"name\":\"Explainer page\",\"drupal_internal__type\":\"explainer\",\"description\":\"Use \u003ci\u003eExplainer pages\u003c/i\u003e to provide general information in plain language about a policy, program, tool, service, or task related to security and privacy at CMS.\",\"help\":null,\"new_revision\":true,\"preview_mode\":1,\"display_submitted\":true}\n1c:{\"type\":\"node_type--node_type\",\"id\":\"d185e460-4998-4d2b-85cb-b04f304dfb1b\",\"links\":\"$1d\",\"attributes\":\"$1f\"}\n28:{\"href\":\"https://cybergeek.cms.gov/jsonapi/user/user/3621116d-42ad-4630-8ff7-ec6dda4bc633\"}\n27:{\"self\":\"$28\"}\n29:{\"display_name\":\"dbartley\"}\n26:{\"type\":\"user--user\",\"id\":\"3621116d-42ad-4630-8ff7-ec6dda4bc633\",\"links\":\"$27\",\"attributes\":\"$29\"}\n2c:{\"href\":\"https://cybergeek.cms.gov/jsonapi/user/user/e352e203-fe9c-47ba-af75-2c7f8302fca8\"}\n2b:{\"self\":\"$2c\"}\n2d:{\"display_name\":\"mburgess\"}\n2a:{\"type\":\"user--user\",\"id\":\"e352e203-fe9c-47ba-af75-2c7f8302fca8\",\"links\":\"$2b\",\"attributes\":\"$2d\"}\n30:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/9e907eeb-b0a8-4dd3-8818-37cb1557a8f4?resourceVersion=id%3A121\"}\n2f:{\"self\":\"$30\"}\n32:{\"alias\":null,\"pid\":null,\"langcode\":\"en\"}\n31:{\"drupal_internal__tid\":121,\"drupal_internal__revision_id\":121,\"langcode\":\"en\",\"revision_created\":\"2022-08-02T23:13:12+00:00\",\"status\":true,\"name\":\"Tools / Services\",\"description\":null,\"weight\":5,\"changed\":\"2023-06-14T19:04:09+00:00\",\"defau"])</script><script>self.__next_f.push([1,"lt_langcode\":true,\"revision_translation_affected\":true,\"path\":\"$32\"}\n36:{\"drupal_internal__target_id\":\"resource_type\"}\n35:{\"type\":\"taxonomy_vocabulary--taxonomy_vocabulary\",\"id\":\"3a0127c4-ee06-41ed-8239-f796f6d78eb3\",\"meta\":\"$36\"}\n38:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/9e907eeb-b0a8-4dd3-8818-37cb1557a8f4/vid?resourceVersion=id%3A121\"}\n39:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/9e907eeb-b0a8-4dd3-8818-37cb1557a8f4/relationships/vid?resourceVersion=id%3A121\"}\n37:{\"related\":\"$38\",\"self\":\"$39\"}\n34:{\"data\":\"$35\",\"links\":\"$37\"}\n3c:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/9e907eeb-b0a8-4dd3-8818-37cb1557a8f4/revision_user?resourceVersion=id%3A121\"}\n3d:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/9e907eeb-b0a8-4dd3-8818-37cb1557a8f4/relationships/revision_user?resourceVersion=id%3A121\"}\n3b:{\"related\":\"$3c\",\"self\":\"$3d\"}\n3a:{\"data\":null,\"links\":\"$3b\"}\n44:{\"about\":\"Usage and meaning of the 'virtual' resource identifier.\"}\n43:{\"href\":\"https://www.drupal.org/docs/8/modules/json-api/core-concepts#virtual\",\"meta\":\"$44\"}\n42:{\"help\":\"$43\"}\n41:{\"links\":\"$42\"}\n40:{\"type\":\"taxonomy_term--resource_type\",\"id\":\"virtual\",\"meta\":\"$41\"}\n3f:[\"$40\"]\n46:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/9e907eeb-b0a8-4dd3-8818-37cb1557a8f4/parent?resourceVersion=id%3A121\"}\n47:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/9e907eeb-b0a8-4dd3-8818-37cb1557a8f4/relationships/parent?resourceVersion=id%3A121\"}\n45:{\"related\":\"$46\",\"self\":\"$47\"}\n3e:{\"data\":\"$3f\",\"links\":\"$45\"}\n33:{\"vid\":\"$34\",\"revision_user\":\"$3a\",\"parent\":\"$3e\"}\n2e:{\"type\":\"taxonomy_term--resource_type\",\"id\":\"9e907eeb-b0a8-4dd3-8818-37cb1557a8f4\",\"links\":\"$2f\",\"attributes\":\"$31\",\"relationships\":\"$33\"}\n4a:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab?resourceVersion=id%3A61\"}\n49:{\"self\":\"$4a\"}\n4c:{\"alias\":null,\"pid\":null,\"langcode\":\"en\"}\n4b:{\"drupal_internal__tid\""])</script><script>self.__next_f.push([1,":61,\"drupal_internal__revision_id\":61,\"langcode\":\"en\",\"revision_created\":\"2022-08-02T23:08:12+00:00\",\"status\":true,\"name\":\"Information System Security Officer (ISSO)\",\"description\":null,\"weight\":0,\"changed\":\"2022-08-02T23:08:12+00:00\",\"default_langcode\":true,\"revision_translation_affected\":true,\"path\":\"$4c\"}\n50:{\"drupal_internal__target_id\":\"roles\"}\n4f:{\"type\":\"taxonomy_vocabulary--taxonomy_vocabulary\",\"id\":\"a89af840-d1f0-4a08-9f15-7b1cb71c3e35\",\"meta\":\"$50\"}\n52:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab/vid?resourceVersion=id%3A61\"}\n53:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab/relationships/vid?resourceVersion=id%3A61\"}\n51:{\"related\":\"$52\",\"self\":\"$53\"}\n4e:{\"data\":\"$4f\",\"links\":\"$51\"}\n56:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab/revision_user?resourceVersion=id%3A61\"}\n57:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab/relationships/revision_user?resourceVersion=id%3A61\"}\n55:{\"related\":\"$56\",\"self\":\"$57\"}\n54:{\"data\":null,\"links\":\"$55\"}\n5e:{\"about\":\"Usage and meaning of the 'virtual' resource identifier.\"}\n5d:{\"href\":\"https://www.drupal.org/docs/8/modules/json-api/core-concepts#virtual\",\"meta\":\"$5e\"}\n5c:{\"help\":\"$5d\"}\n5b:{\"links\":\"$5c\"}\n5a:{\"type\":\"taxonomy_term--roles\",\"id\":\"virtual\",\"meta\":\"$5b\"}\n59:[\"$5a\"]\n60:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab/parent?resourceVersion=id%3A61\"}\n61:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab/relationships/parent?resourceVersion=id%3A61\"}\n5f:{\"related\":\"$60\",\"self\":\"$61\"}\n58:{\"data\":\"$59\",\"links\":\"$5f\"}\n4d:{\"vid\":\"$4e\",\"revision_user\":\"$54\",\"parent\":\"$58\"}\n48:{\"type\":\"taxonomy_term--roles\",\"id\":\"7a18463d-b0fc-474f-8536-ad7db1b2e5ab\",\"links\":\"$49\",\"attributes\":\"$4b\",\"relationships\":\"$4d\"}\n64:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_"])</script><script>self.__next_f.push([1,"term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d?resourceVersion=id%3A56\"}\n63:{\"self\":\"$64\"}\n66:{\"alias\":null,\"pid\":null,\"langcode\":\"en\"}\n65:{\"drupal_internal__tid\":56,\"drupal_internal__revision_id\":56,\"langcode\":\"en\",\"revision_created\":\"2022-08-02T23:06:35+00:00\",\"status\":true,\"name\":\"Training \u0026 Awareness\",\"description\":null,\"weight\":8,\"changed\":\"2024-06-14T17:38:33+00:00\",\"default_langcode\":true,\"revision_translation_affected\":true,\"path\":\"$66\"}\n6a:{\"drupal_internal__target_id\":\"topics\"}\n69:{\"type\":\"taxonomy_vocabulary--taxonomy_vocabulary\",\"id\":\"73f89dec-123f-4c8c-9a97-d025a2b0e5cf\",\"meta\":\"$6a\"}\n6c:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d/vid?resourceVersion=id%3A56\"}\n6d:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d/relationships/vid?resourceVersion=id%3A56\"}\n6b:{\"related\":\"$6c\",\"self\":\"$6d\"}\n68:{\"data\":\"$69\",\"links\":\"$6b\"}\n70:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d/revision_user?resourceVersion=id%3A56\"}\n71:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d/relationships/revision_user?resourceVersion=id%3A56\"}\n6f:{\"related\":\"$70\",\"self\":\"$71\"}\n6e:{\"data\":null,\"links\":\"$6f\"}\n78:{\"about\":\"Usage and meaning of the 'virtual' resource identifier.\"}\n77:{\"href\":\"https://www.drupal.org/docs/8/modules/json-api/core-concepts#virtual\",\"meta\":\"$78\"}\n76:{\"help\":\"$77\"}\n75:{\"links\":\"$76\"}\n74:{\"type\":\"taxonomy_term--topics\",\"id\":\"virtual\",\"meta\":\"$75\"}\n73:[\"$74\"]\n7a:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d/parent?resourceVersion=id%3A56\"}\n7b:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d/relationships/parent?resourceVersion=id%3A56\"}\n79:{\"related\":\"$7a\",\"self\":\"$7b\"}\n72:{\"data\":\"$73\",\"links\":\"$79\"}\n67:{\"vid\":\"$68\",\"revision_user\":\"$6e\",\"parent\":\"$72\"}\n62:{\"type\":\"taxonomy_term--topics\",\"id\""])</script><script>self.__next_f.push([1,":\"8b8ffea0-3b0b-404d-8442-7f3a4602482d\",\"links\":\"$63\",\"attributes\":\"$65\",\"relationships\":\"$67\"}\n7e:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/f9ca6b9e-0b66-4c42-aa2c-2ff997c11894?resourceVersion=id%3A19605\"}\n7d:{\"self\":\"$7e\"}\n80:[]\n81:{\"value\":\"\u003ch2\u003e\u003cstrong\u003eWhat is the ISSO Mentorship Program?\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eThe CMS ISSO Mentorship Program seeks to improve the overall readiness and skill of Information System Security Officers (ISSOs) at CMS by creating opportunities for knowledge sharing and support among ISSOs of all experience levels. Both mentors and mentees benefit from a partnership that is structured enough to provide growth towards defined goals yet flexible enough that anyone can participate.\u003c/p\u003e\u003cp\u003eBecause the role of an ISSO is critical for ensuring security and privacy compliance for FISMA systems, this program dedicated to helping ISSOs succeed improves the overall security posture and culture at CMS.\u003c/p\u003e\",\"format\":\"body_text\",\"processed\":\"\u003ch2\u003e\u003cstrong\u003eWhat is the ISSO Mentorship Program?\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eThe CMS ISSO Mentorship Program seeks to improve the overall readiness and skill of Information System Security Officers (ISSOs) at CMS by creating opportunities for knowledge sharing and support among ISSOs of all experience levels. Both mentors and mentees benefit from a partnership that is structured enough to provide growth towards defined goals yet flexible enough that anyone can participate.\u003c/p\u003e\u003cp\u003eBecause the role of an ISSO is critical for ensuring security and privacy compliance for FISMA systems, this program dedicated to helping ISSOs succeed improves the overall security posture and culture at CMS.\u003c/p\u003e\"}\n7f:{\"drupal_internal__id\":2296,\"drupal_internal__revision_id\":19605,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-03-01T16:13:37+00:00\",\"parent_id\":\"761\",\"parent_type\":\"node\",\"parent_field_name\":\"field_page_section\",\"behavior_settings\":\"$80\",\"default_langcode\":true,\"revision_translation_affected\":true,\"field_text_block\":\"$81\"}\n85:{\"drupal_internal__target_id\":\""])</script><script>self.__next_f.push([1,"page_section\"}\n84:{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"57f3f40a-8120-4393-b881-a5758f9fb30d\",\"meta\":\"$85\"}\n87:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/f9ca6b9e-0b66-4c42-aa2c-2ff997c11894/paragraph_type?resourceVersion=id%3A19605\"}\n88:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/f9ca6b9e-0b66-4c42-aa2c-2ff997c11894/relationships/paragraph_type?resourceVersion=id%3A19605\"}\n86:{\"related\":\"$87\",\"self\":\"$88\"}\n83:{\"data\":\"$84\",\"links\":\"$86\"}\n8b:{\"target_revision_id\":19604,\"drupal_internal__target_id\":2606}\n8a:{\"type\":\"paragraph--call_out_box\",\"id\":\"2b4d5747-72a7-446d-a7cb-116571fc4cdb\",\"meta\":\"$8b\"}\n8d:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/f9ca6b9e-0b66-4c42-aa2c-2ff997c11894/field_specialty_item?resourceVersion=id%3A19605\"}\n8e:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/f9ca6b9e-0b66-4c42-aa2c-2ff997c11894/relationships/field_specialty_item?resourceVersion=id%3A19605\"}\n8c:{\"related\":\"$8d\",\"self\":\"$8e\"}\n89:{\"data\":\"$8a\",\"links\":\"$8c\"}\n82:{\"paragraph_type\":\"$83\",\"field_specialty_item\":\"$89\"}\n7c:{\"type\":\"paragraph--page_section\",\"id\":\"f9ca6b9e-0b66-4c42-aa2c-2ff997c11894\",\"links\":\"$7d\",\"attributes\":\"$7f\",\"relationships\":\"$82\"}\n91:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/1c38d685-2704-4e1f-921d-3b1ed5737b6f?resourceVersion=id%3A19606\"}\n90:{\"self\":\"$91\"}\n93:[]\n95:T1d17,"])</script><script>self.__next_f.push([1,"\u003ch2\u003e\u003cstrong\u003eIs mentorship right for me?\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eIf you are an ISSO at CMS (either federal staff or contractor support), you are eligible for the program. There are many benefits to participating in mentorship as either a mentee or a mentor.\u003c/p\u003e\u003ch3\u003e\u003cstrong\u003eFor mentees\u003c/strong\u003e\u003c/h3\u003e\u003cp\u003eYou may want to consider participating \u003cstrong\u003eas a mentee\u003c/strong\u003e if:\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou are a new ISSO at CMS.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eWhether you are brand new to the role of Information System Security Officer or you are onboarding as a \u003ca href=\"https://cybergeek.cms.gov/learn/isso-service\"\u003eService ISSO\u003c/a\u003e, teaming up with an experienced CMS ISSO can smooth your orientation and help you gain confidence in your new role. Your mentor can point you to resources, teach you to use them effectively, and share tips about the CMS “way of doing things”.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou are dealing with an unfamiliar or challenging task.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eEven if youre not a new ISSO, the mentorship program offers an opportunity for bootstrap support on new or challenging projects. You can be paired with an experienced ISSO and benefit from their lessons learned whether that means getting support towards a long-term goal like \u003ca href=\"https://cybergeek.cms.gov/learn/authorization-operate-ato\"\u003eAuthorization to Operate (ATO)\u003c/a\u003e or focused assistance on a specific task.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou want to expand your skills as an ISSO.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eMentorship isnt just for onboarding or overcoming challenges. It can also be a tool for relationship building and professional development. You may choose to participate in the program to expand your skills and learn about new tools or practices. Having a trusted peer in your field can help you reach beyond your comfort zone and grow your career and network.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou are not an ISSO, but want to learn about the role.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eEven non-ISSOs can apply to be mentored, with approval from their supervisor and the ISSO Support Team. If you are thinking of transitioning to an ISSO role, mentorship provides an opportunity to get real-world insight and advice.\u003c/p\u003e\u003ch3\u003e\u003cstrong\u003eFor mentors\u003c/strong\u003e\u003c/h3\u003e\u003cp\u003eYou may want to consider participating \u003cstrong\u003eas a mentor\u003c/strong\u003e if:\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou enjoy helping others.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eWe encourage experienced ISSOs to consider the motto, “Pass it on!” Knowing that much of your current success is the result of others investment of time and energy in your life, you may want to pay that investment forward by helping someone else to grow and learn.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou want to expand your leadership skills.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eMentoring offers a way for experienced ISSOs to practice interpersonal skills such as active listening, establishing trust, and teaching by example. These skills are valued by employers and co-workers alike and are essential for advancing into leadership roles. Serving as a mentor also gives you a practical way to demonstrate your hard-earned expertise.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou care deeply about CMS security culture.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eInformation security and privacy at CMS are not just for compliance they are essential for building trust with our beneficiaries, customers, and the American public. Mentoring provides an opportunity to build a more knowledgeable ISSO workforce and advance security awareness at CMS, resulting in a stronger overall security posture for our FISMA systems.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou value self-reflection and continuous improvement.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eA growth mindset remains important even for experienced ISSOs. Mentoring a peer can motivate you to learn more about yourself and identify areas where you want to continue learning. In a healthy mentorship, the mentee will often have valuable insights for the mentor as well.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eHow it works\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eThe mentorship program is flexible and based on the specific needs of mentors and mentees. The ISSO Support Team works with interested individuals to find an appropriate partner for a mentorship engagement (based on the goals and desired outcomes of both parties). From there, the two ISSOs decide how they will work together and for how long.\u003c/p\u003e\u003ch3\u003e\u003cstrong\u003eWhat mentorship is not\u003c/strong\u003e\u003c/h3\u003e\u003cp\u003eWhile ISSO mentorship can bring valuable benefits to both of the people involved, its important to understand what the program is \u003cstrong\u003enot \u003c/strong\u003emeant to address.\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cstrong\u003eMentors dont complete work on behalf of mentees\u003c/strong\u003e. They can offer support, resources, and lessons learned but the mentee remains responsible for their own work.\u003c/li\u003e\u003cli\u003e\u0026nbsp;\u003cstrong\u003eMentorship is not Training.\u003c/strong\u003e Mentorship focuses on a personalized, long-term relationship with a more experienced individual providing guidance and support based on their experience, while training is a structured process of delivering specific knowledge and skills through a set curriculum, often in a group setting, with a more teacher-student dynamic.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eMentorship is not a shortcut\u003c/strong\u003e. While it will help mentees be more effective in their role, the mentorship itself requires an investment of time and energy. Its not an “easy fix” for challenges, but rather an opportunity for both people to grow their skills.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eThe mentor is not a manager. \u003c/strong\u003eThe mentee does not report to the mentor, and the mentor does not evaluate the mentee. Instead, they share and learn together in a structured yet flexible arrangement.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eMentorship is not a requirement.\u003c/strong\u003e The ISSO Mentorship Program is a completely voluntary though highly encouraged opportunity for growth and professional development.\u003c/li\u003e\u003c/ul\u003e\u003ch3\u003e\u003cstrong\u003eSuccessful ISSO mentorship at CMS\u003c/strong\u003e\u003c/h3\u003e\u003cp\u003eMentoring has proven to be a highly \u003ca href=\"https://www.govtech.com/blogs/lohrmann-on-cybersecurity/security-pros-need-a-mentor-heres-why-and-how.html\"\u003ebeneficial activity for cybersecurity professionals\u003c/a\u003e, but not everyone is familiar with how mentorships should work. To be successful in partnership with another ISSO, keep the following in mind:\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eMentoring is a two-way street.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eBoth mentors and mentees will benefit from a healthy mentoring partnership. They can both learn from one another regardless of age, background, or level of experience. Successful mentorships are built on mutual trust and willingness to learn. This doesnt mean the mentor and mentee must become friends, but they should have respect and appreciation for one other.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eMentees hold the most responsibility.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eIt may surprise you to learn that the mentor is not the primary driver of the partnership. In the ISSO Mentorship Program, mentees have the greater responsibility to set goals, schedule meetings, and prepare materials and questions in advance to make sure time is spent effectively. While both people can share some of these responsibilities, the mentee should consider themselves the main driver.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eIt's okay to end a mentorship that isn't working.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eNot all partnerships are an ideal match. This could be due to various factors such as logistical challenges, a shift in priorities for either party, or personality differences. Its important to communicate with clarity and empathy and be willing to amicably end the mentorship if its not working well. This is not a negative reflection on the mentor or mentee.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"96:T1d17,"])</script><script>self.__next_f.push([1,"\u003ch2\u003e\u003cstrong\u003eIs mentorship right for me?\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eIf you are an ISSO at CMS (either federal staff or contractor support), you are eligible for the program. There are many benefits to participating in mentorship as either a mentee or a mentor.\u003c/p\u003e\u003ch3\u003e\u003cstrong\u003eFor mentees\u003c/strong\u003e\u003c/h3\u003e\u003cp\u003eYou may want to consider participating \u003cstrong\u003eas a mentee\u003c/strong\u003e if:\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou are a new ISSO at CMS.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eWhether you are brand new to the role of Information System Security Officer or you are onboarding as a \u003ca href=\"https://cybergeek.cms.gov/learn/isso-service\"\u003eService ISSO\u003c/a\u003e, teaming up with an experienced CMS ISSO can smooth your orientation and help you gain confidence in your new role. Your mentor can point you to resources, teach you to use them effectively, and share tips about the CMS “way of doing things”.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou are dealing with an unfamiliar or challenging task.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eEven if youre not a new ISSO, the mentorship program offers an opportunity for bootstrap support on new or challenging projects. You can be paired with an experienced ISSO and benefit from their lessons learned whether that means getting support towards a long-term goal like \u003ca href=\"https://cybergeek.cms.gov/learn/authorization-operate-ato\"\u003eAuthorization to Operate (ATO)\u003c/a\u003e or focused assistance on a specific task.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou want to expand your skills as an ISSO.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eMentorship isnt just for onboarding or overcoming challenges. It can also be a tool for relationship building and professional development. You may choose to participate in the program to expand your skills and learn about new tools or practices. Having a trusted peer in your field can help you reach beyond your comfort zone and grow your career and network.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou are not an ISSO, but want to learn about the role.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eEven non-ISSOs can apply to be mentored, with approval from their supervisor and the ISSO Support Team. If you are thinking of transitioning to an ISSO role, mentorship provides an opportunity to get real-world insight and advice.\u003c/p\u003e\u003ch3\u003e\u003cstrong\u003eFor mentors\u003c/strong\u003e\u003c/h3\u003e\u003cp\u003eYou may want to consider participating \u003cstrong\u003eas a mentor\u003c/strong\u003e if:\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou enjoy helping others.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eWe encourage experienced ISSOs to consider the motto, “Pass it on!” Knowing that much of your current success is the result of others investment of time and energy in your life, you may want to pay that investment forward by helping someone else to grow and learn.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou want to expand your leadership skills.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eMentoring offers a way for experienced ISSOs to practice interpersonal skills such as active listening, establishing trust, and teaching by example. These skills are valued by employers and co-workers alike and are essential for advancing into leadership roles. Serving as a mentor also gives you a practical way to demonstrate your hard-earned expertise.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou care deeply about CMS security culture.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eInformation security and privacy at CMS are not just for compliance they are essential for building trust with our beneficiaries, customers, and the American public. Mentoring provides an opportunity to build a more knowledgeable ISSO workforce and advance security awareness at CMS, resulting in a stronger overall security posture for our FISMA systems.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eYou value self-reflection and continuous improvement.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eA growth mindset remains important even for experienced ISSOs. Mentoring a peer can motivate you to learn more about yourself and identify areas where you want to continue learning. In a healthy mentorship, the mentee will often have valuable insights for the mentor as well.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eHow it works\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eThe mentorship program is flexible and based on the specific needs of mentors and mentees. The ISSO Support Team works with interested individuals to find an appropriate partner for a mentorship engagement (based on the goals and desired outcomes of both parties). From there, the two ISSOs decide how they will work together and for how long.\u003c/p\u003e\u003ch3\u003e\u003cstrong\u003eWhat mentorship is not\u003c/strong\u003e\u003c/h3\u003e\u003cp\u003eWhile ISSO mentorship can bring valuable benefits to both of the people involved, its important to understand what the program is \u003cstrong\u003enot \u003c/strong\u003emeant to address.\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cstrong\u003eMentors dont complete work on behalf of mentees\u003c/strong\u003e. They can offer support, resources, and lessons learned but the mentee remains responsible for their own work.\u003c/li\u003e\u003cli\u003e\u0026nbsp;\u003cstrong\u003eMentorship is not Training.\u003c/strong\u003e Mentorship focuses on a personalized, long-term relationship with a more experienced individual providing guidance and support based on their experience, while training is a structured process of delivering specific knowledge and skills through a set curriculum, often in a group setting, with a more teacher-student dynamic.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eMentorship is not a shortcut\u003c/strong\u003e. While it will help mentees be more effective in their role, the mentorship itself requires an investment of time and energy. Its not an “easy fix” for challenges, but rather an opportunity for both people to grow their skills.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eThe mentor is not a manager. \u003c/strong\u003eThe mentee does not report to the mentor, and the mentor does not evaluate the mentee. Instead, they share and learn together in a structured yet flexible arrangement.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eMentorship is not a requirement.\u003c/strong\u003e The ISSO Mentorship Program is a completely voluntary though highly encouraged opportunity for growth and professional development.\u003c/li\u003e\u003c/ul\u003e\u003ch3\u003e\u003cstrong\u003eSuccessful ISSO mentorship at CMS\u003c/strong\u003e\u003c/h3\u003e\u003cp\u003eMentoring has proven to be a highly \u003ca href=\"https://www.govtech.com/blogs/lohrmann-on-cybersecurity/security-pros-need-a-mentor-heres-why-and-how.html\"\u003ebeneficial activity for cybersecurity professionals\u003c/a\u003e, but not everyone is familiar with how mentorships should work. To be successful in partnership with another ISSO, keep the following in mind:\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eMentoring is a two-way street.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eBoth mentors and mentees will benefit from a healthy mentoring partnership. They can both learn from one another regardless of age, background, or level of experience. Successful mentorships are built on mutual trust and willingness to learn. This doesnt mean the mentor and mentee must become friends, but they should have respect and appreciation for one other.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eMentees hold the most responsibility.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eIt may surprise you to learn that the mentor is not the primary driver of the partnership. In the ISSO Mentorship Program, mentees have the greater responsibility to set goals, schedule meetings, and prepare materials and questions in advance to make sure time is spent effectively. While both people can share some of these responsibilities, the mentee should consider themselves the main driver.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eIt's okay to end a mentorship that isn't working.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eNot all partnerships are an ideal match. This could be due to various factors such as logistical challenges, a shift in priorities for either party, or personality differences. Its important to communicate with clarity and empathy and be willing to amicably end the mentorship if its not working well. This is not a negative reflection on the mentor or mentee.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"94:{\"value\":\"$95\",\"format\":\"body_text\",\"processed\":\"$96\"}\n92:{\"drupal_internal__id\":2636,\"drupal_internal__revision_id\":19606,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-03-24T17:32:39+00:00\",\"parent_id\":\"761\",\"parent_type\":\"node\",\"parent_field_name\":\"field_page_section\",\"behavior_settings\":\"$93\",\"default_langcode\":true,\"revision_translation_affected\":true,\"field_text_block\":\"$94\"}\n9a:{\"drupal_internal__target_id\":\"page_section\"}\n99:{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"57f3f40a-8120-4393-b881-a5758f9fb30d\",\"meta\":\"$9a\"}\n9c:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/1c38d685-2704-4e1f-921d-3b1ed5737b6f/paragraph_type?resourceVersion=id%3A19606\"}\n9d:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/1c38d685-2704-4e1f-921d-3b1ed5737b6f/relationships/paragraph_type?resourceVersion=id%3A19606\"}\n9b:{\"related\":\"$9c\",\"self\":\"$9d\"}\n98:{\"data\":\"$99\",\"links\":\"$9b\"}\na0:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/1c38d685-2704-4e1f-921d-3b1ed5737b6f/field_specialty_item?resourceVersion=id%3A19606\"}\na1:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/1c38d685-2704-4e1f-921d-3b1ed5737b6f/relationships/field_specialty_item?resourceVersion=id%3A19606\"}\n9f:{\"related\":\"$a0\",\"self\":\"$a1\"}\n9e:{\"data\":null,\"links\":\"$9f\"}\n97:{\"paragraph_type\":\"$98\",\"field_specialty_item\":\"$9e\"}\n8f:{\"type\":\"paragraph--page_section\",\"id\":\"1c38d685-2704-4e1f-921d-3b1ed5737b6f\",\"links\":\"$90\",\"attributes\":\"$92\",\"relationships\":\"$97\"}\na4:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/e1397bac-2738-4de5-9e57-6f09f6751d42?resourceVersion=id%3A19615\"}\na3:{\"self\":\"$a4\"}\na6:[]\na7:{\"value\":\"\u003ch2\u003e\u003cstrong\u003eSteps to get started\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eWhether you want to be a mentor or mentee, these are the steps you can take to begin participation in the ISSO Mentorship Program:\u003c/p\u003e\",\"format\":\"body_text\",\"processed\":\"\u003ch2\u003e\u003cstrong\u003eSteps to get started\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eWhether you want to be a mentor or mentee, these are the steps you can take to begin participation in t"])</script><script>self.__next_f.push([1,"he ISSO Mentorship Program:\u003c/p\u003e\"}\na5:{\"drupal_internal__id\":2736,\"drupal_internal__revision_id\":19615,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-03-24T17:45:33+00:00\",\"parent_id\":\"761\",\"parent_type\":\"node\",\"parent_field_name\":\"field_page_section\",\"behavior_settings\":\"$a6\",\"default_langcode\":true,\"revision_translation_affected\":true,\"field_text_block\":\"$a7\"}\nab:{\"drupal_internal__target_id\":\"page_section\"}\naa:{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"57f3f40a-8120-4393-b881-a5758f9fb30d\",\"meta\":\"$ab\"}\nad:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/e1397bac-2738-4de5-9e57-6f09f6751d42/paragraph_type?resourceVersion=id%3A19615\"}\nae:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/e1397bac-2738-4de5-9e57-6f09f6751d42/relationships/paragraph_type?resourceVersion=id%3A19615\"}\nac:{\"related\":\"$ad\",\"self\":\"$ae\"}\na9:{\"data\":\"$aa\",\"links\":\"$ac\"}\nb1:{\"target_revision_id\":19614,\"drupal_internal__target_id\":2731}\nb0:{\"type\":\"paragraph--process_list\",\"id\":\"4b0acb88-c6ef-4d05-89d7-30df164aa5a4\",\"meta\":\"$b1\"}\nb3:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/e1397bac-2738-4de5-9e57-6f09f6751d42/field_specialty_item?resourceVersion=id%3A19615\"}\nb4:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/e1397bac-2738-4de5-9e57-6f09f6751d42/relationships/field_specialty_item?resourceVersion=id%3A19615\"}\nb2:{\"related\":\"$b3\",\"self\":\"$b4\"}\naf:{\"data\":\"$b0\",\"links\":\"$b2\"}\na8:{\"paragraph_type\":\"$a9\",\"field_specialty_item\":\"$af\"}\na2:{\"type\":\"paragraph--page_section\",\"id\":\"e1397bac-2738-4de5-9e57-6f09f6751d42\",\"links\":\"$a3\",\"attributes\":\"$a5\",\"relationships\":\"$a8\"}\nb7:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/60a7d525-a81d-4ae7-9349-d7ed4e8588f9?resourceVersion=id%3A19616\"}\nb6:{\"self\":\"$b7\"}\nb9:[]\nbb:T198a,"])</script><script>self.__next_f.push([1,"\u003ch2\u003e\u003cstrong\u003eTips for mentors\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eYou will be most successful as a mentor in the program if you:\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cstrong\u003eTeach by example. \u003c/strong\u003eRemember the mentee will take their cues from your actions (not only your words). Model the behaviors and work ethics that will help them succeed.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eShare about failures as well as successes. \u003c/strong\u003eYou as a mentor are not expected to be perfect. Sharing lessons learned from past failures will help your mentee avoid similar mistakes.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eKeep the mentee at the center. \u003c/strong\u003eWhile you as a mentor will definitely benefit from the partnership, remember that the mentees growth and learning is top priority.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eUse helpful frameworks\u003c/strong\u003e. While ad hoc conversations can be beneficial, your mentee might benefit from the use of structured frameworks such as \u003ca href=\"https://www.insala.com/blog/how-to-become-a-successful-mentor\"\u003eSMART goals and SWOT analysis\u003c/a\u003e.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eBe open to learning\u003c/strong\u003e. Mentors and not just mentees can expect to grow and learn from the partnership. Keep an open mind, and see what your mentee may be able to teach or show you.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eShare experiences instead of dictating actions.\u003c/strong\u003e You can explain how you handled a similar situation or make suggestions based on past lessons learned but try to let the mentee come to their own conclusions.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eBe a connector.\u003c/strong\u003e Your knowledge of people and resources at CMS are a treasure trove to your mentee. Point them to valuable tools like the \u003ca href=\"/policy-guidance/cms-information-system-security-officer-isso-handbook\"\u003eISSO Handbook\u003c/a\u003e and introduce them to more people they can learn from.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eBe honest.\u003c/strong\u003e Dont be afraid to challenge your mentee if their ideas or actions are headed off-course. Be kind but direct with your feedback so they can improve and hold themselves accountable to their goals.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eBe approachable and available\u003c/strong\u003e. Regular connection with your mentee is necessary for you to maintain a thriving relationship. While the two of you will decide together on meeting frequency, make sure they feel comfortable reaching out for guidance.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eAsk for help\u003c/strong\u003e. Even as the mentor, you can ask questions or get help anytime from the ISSO Support Team: \u003ca href=\"mailto:ISSO@cms.hhs.gov\"\u003eISSO@cms.hhs.gov\u003c/a\u003e. Please dont hesitate to reach out.\u003c/li\u003e\u003c/ul\u003e\u003ch2\u003e\u003cstrong\u003eTips for mentees\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eYou will be most successful as a mentee in the program if you:\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cstrong\u003eSet SMART goals\u003c/strong\u003e. Take time to document clear goals with specific outcomes \u003ca href=\"https://www.atlassian.com/blog/productivity/how-to-write-smart-goals\"\u003eSMART goals\u003c/a\u003e are \u003cem\u003eSpecific, Measurable, Achievable, Relevant, and Time-Bound\u003c/em\u003e. Make sure your goals for the mentorship are realistic, taking the availability and experience of your mentor into consideration.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eTake responsibility.\u003c/strong\u003e Your mentor can provide tools and advice, but you are ultimately responsible for your own growth and learning. Be an active and eager participant in the process. Take initiative and take notes!\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eTake appropriate risks.\u003c/strong\u003e Your mentor may help you stretch beyond your comfort zone and lean in to new opportunities. Appropriate risk-taking is excellent for growth. Dont be afraid to make mistakes as long as you learn from them.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eRespect your mentors time\u003c/strong\u003e. Remember your mentor is a volunteer, giving of their time to help you grow. Make the most of the time you have with them. Always come prepared with an agenda, and let them know well in advance if you need to reschedule.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eUnderstand your mentors limits.\u003c/strong\u003e Your mentor will help you as much as they can, but if you have a need they cant address because of limited time or lack of experience in a specific realm, they will point you to resources or other people who can help.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eGive helpful feedback\u003c/strong\u003e. Be honest about your needs and goals. Ask questions if theres something you dont understand. Your mentor cant read your mind, so let them know if theres something else they can do to help and when they are doing a great job!\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eInvest in the relationship\u003c/strong\u003e. Trust and mutual respect do not happen automatically when the mentorship begins. You can nurture the relationship by showing appreciation, communicating thoughtfully, and demonstrating a growth mindset.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eAsk for help\u003c/strong\u003e. Remember your mentor is there to support you, so ask questions when you have them. Regarding the mentorship itself, you can also ask questions or get help anytime from the ISSO Support Team: \u003ca href=\"mailto:ISSO@cms.hhs.gov\"\u003eISSO@cms.hhs.gov\u003c/a\u003e.\u003c/li\u003e\u003c/ul\u003e\u003ch2\u003e\u003cstrong\u003eISSO resources\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eFor anyone participating in the ISSO Mentorship Program, its important to have quick access to ISSO resources provided by CMS and other organizations.\u0026nbsp;\u003c/p\u003e\u003cp\u003eThe \u003ca href=\"/policy-guidance/cms-information-system-security-officer-isso-handbook\"\u003eCMS Information Systems Security Officer (ISSO) Handbook\u003c/a\u003e is the authoritative guide for everything a CMS ISSO needs. As a mentor or mentee, this handbook is your trusted tool to help you find useful information like:\u003c/p\u003e\u003cp\u003e\u003ca href=\"/policy-guidance/cms-information-system-security-officer-isso-handbook#getting-started-for-new-issos\"\u003e\u003cstrong\u003eTips for getting started\u003c/strong\u003e\u003c/a\u003e\u003cstrong\u003e -\u0026nbsp;\u003c/strong\u003eEverything a new ISSO needs for onboarding at CMS, including self-assessment, initial meetings, and goals for the first year.\u003c/p\u003e\u003cp\u003e\u003ca href=\"/policy-guidance/cms-information-system-security-officer-isso-handbook#role-responsibilities\"\u003e\u003cstrong\u003eRole and responsibilities\u003c/strong\u003e\u003c/a\u003e\u0026nbsp;-\u0026nbsp;Learn whats expected of an ISSO at CMS, and how to perform all required duties.\u003c/p\u003e\u003cp\u003e\u003ca href=\"/policy-guidance/cms-information-system-security-officer-isso-handbook#isso-toolkit\"\u003e\u003cstrong\u003eISSO toolkit\u003c/strong\u003e\u003c/a\u003e\u003cstrong\u003e\u0026nbsp;- \u003c/strong\u003eEverything you need to be successful as an ISSO, including helpful documents,\u0026nbsp;events, Slack channels, tools, and programs.\u003c/p\u003e\u003cp\u003e\u003ca href=\"/policy-guidance/cms-information-system-security-officer-isso-handbook#training\"\u003e\u003cstrong\u003eTraining opportunities\u003c/strong\u003e\u003c/a\u003e\u003cstrong\u003e -\u0026nbsp;\u003c/strong\u003eBrowse free training offerings from CMS and HHS to help ISSOs of all skill levels advance their knowledge and grow in their careers.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"bc:T198a,"])</script><script>self.__next_f.push([1,"\u003ch2\u003e\u003cstrong\u003eTips for mentors\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eYou will be most successful as a mentor in the program if you:\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cstrong\u003eTeach by example. \u003c/strong\u003eRemember the mentee will take their cues from your actions (not only your words). Model the behaviors and work ethics that will help them succeed.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eShare about failures as well as successes. \u003c/strong\u003eYou as a mentor are not expected to be perfect. Sharing lessons learned from past failures will help your mentee avoid similar mistakes.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eKeep the mentee at the center. \u003c/strong\u003eWhile you as a mentor will definitely benefit from the partnership, remember that the mentees growth and learning is top priority.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eUse helpful frameworks\u003c/strong\u003e. While ad hoc conversations can be beneficial, your mentee might benefit from the use of structured frameworks such as \u003ca href=\"https://www.insala.com/blog/how-to-become-a-successful-mentor\"\u003eSMART goals and SWOT analysis\u003c/a\u003e.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eBe open to learning\u003c/strong\u003e. Mentors and not just mentees can expect to grow and learn from the partnership. Keep an open mind, and see what your mentee may be able to teach or show you.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eShare experiences instead of dictating actions.\u003c/strong\u003e You can explain how you handled a similar situation or make suggestions based on past lessons learned but try to let the mentee come to their own conclusions.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eBe a connector.\u003c/strong\u003e Your knowledge of people and resources at CMS are a treasure trove to your mentee. Point them to valuable tools like the \u003ca href=\"/policy-guidance/cms-information-system-security-officer-isso-handbook\"\u003eISSO Handbook\u003c/a\u003e and introduce them to more people they can learn from.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eBe honest.\u003c/strong\u003e Dont be afraid to challenge your mentee if their ideas or actions are headed off-course. Be kind but direct with your feedback so they can improve and hold themselves accountable to their goals.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eBe approachable and available\u003c/strong\u003e. Regular connection with your mentee is necessary for you to maintain a thriving relationship. While the two of you will decide together on meeting frequency, make sure they feel comfortable reaching out for guidance.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eAsk for help\u003c/strong\u003e. Even as the mentor, you can ask questions or get help anytime from the ISSO Support Team: \u003ca href=\"mailto:ISSO@cms.hhs.gov\"\u003eISSO@cms.hhs.gov\u003c/a\u003e. Please dont hesitate to reach out.\u003c/li\u003e\u003c/ul\u003e\u003ch2\u003e\u003cstrong\u003eTips for mentees\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eYou will be most successful as a mentee in the program if you:\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cstrong\u003eSet SMART goals\u003c/strong\u003e. Take time to document clear goals with specific outcomes \u003ca href=\"https://www.atlassian.com/blog/productivity/how-to-write-smart-goals\"\u003eSMART goals\u003c/a\u003e are \u003cem\u003eSpecific, Measurable, Achievable, Relevant, and Time-Bound\u003c/em\u003e. Make sure your goals for the mentorship are realistic, taking the availability and experience of your mentor into consideration.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eTake responsibility.\u003c/strong\u003e Your mentor can provide tools and advice, but you are ultimately responsible for your own growth and learning. Be an active and eager participant in the process. Take initiative and take notes!\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eTake appropriate risks.\u003c/strong\u003e Your mentor may help you stretch beyond your comfort zone and lean in to new opportunities. Appropriate risk-taking is excellent for growth. Dont be afraid to make mistakes as long as you learn from them.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eRespect your mentors time\u003c/strong\u003e. Remember your mentor is a volunteer, giving of their time to help you grow. Make the most of the time you have with them. Always come prepared with an agenda, and let them know well in advance if you need to reschedule.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eUnderstand your mentors limits.\u003c/strong\u003e Your mentor will help you as much as they can, but if you have a need they cant address because of limited time or lack of experience in a specific realm, they will point you to resources or other people who can help.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eGive helpful feedback\u003c/strong\u003e. Be honest about your needs and goals. Ask questions if theres something you dont understand. Your mentor cant read your mind, so let them know if theres something else they can do to help and when they are doing a great job!\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eInvest in the relationship\u003c/strong\u003e. Trust and mutual respect do not happen automatically when the mentorship begins. You can nurture the relationship by showing appreciation, communicating thoughtfully, and demonstrating a growth mindset.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eAsk for help\u003c/strong\u003e. Remember your mentor is there to support you, so ask questions when you have them. Regarding the mentorship itself, you can also ask questions or get help anytime from the ISSO Support Team: \u003ca href=\"mailto:ISSO@cms.hhs.gov\"\u003eISSO@cms.hhs.gov\u003c/a\u003e.\u003c/li\u003e\u003c/ul\u003e\u003ch2\u003e\u003cstrong\u003eISSO resources\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eFor anyone participating in the ISSO Mentorship Program, its important to have quick access to ISSO resources provided by CMS and other organizations.\u0026nbsp;\u003c/p\u003e\u003cp\u003eThe \u003ca href=\"/policy-guidance/cms-information-system-security-officer-isso-handbook\"\u003eCMS Information Systems Security Officer (ISSO) Handbook\u003c/a\u003e is the authoritative guide for everything a CMS ISSO needs. As a mentor or mentee, this handbook is your trusted tool to help you find useful information like:\u003c/p\u003e\u003cp\u003e\u003ca href=\"/policy-guidance/cms-information-system-security-officer-isso-handbook#getting-started-for-new-issos\"\u003e\u003cstrong\u003eTips for getting started\u003c/strong\u003e\u003c/a\u003e\u003cstrong\u003e -\u0026nbsp;\u003c/strong\u003eEverything a new ISSO needs for onboarding at CMS, including self-assessment, initial meetings, and goals for the first year.\u003c/p\u003e\u003cp\u003e\u003ca href=\"/policy-guidance/cms-information-system-security-officer-isso-handbook#role-responsibilities\"\u003e\u003cstrong\u003eRole and responsibilities\u003c/strong\u003e\u003c/a\u003e\u0026nbsp;-\u0026nbsp;Learn whats expected of an ISSO at CMS, and how to perform all required duties.\u003c/p\u003e\u003cp\u003e\u003ca href=\"/policy-guidance/cms-information-system-security-officer-isso-handbook#isso-toolkit\"\u003e\u003cstrong\u003eISSO toolkit\u003c/strong\u003e\u003c/a\u003e\u003cstrong\u003e\u0026nbsp;- \u003c/strong\u003eEverything you need to be successful as an ISSO, including helpful documents,\u0026nbsp;events, Slack channels, tools, and programs.\u003c/p\u003e\u003cp\u003e\u003ca href=\"/policy-guidance/cms-information-system-security-officer-isso-handbook#training\"\u003e\u003cstrong\u003eTraining opportunities\u003c/strong\u003e\u003c/a\u003e\u003cstrong\u003e -\u0026nbsp;\u003c/strong\u003eBrowse free training offerings from CMS and HHS to help ISSOs of all skill levels advance their knowledge and grow in their careers.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"ba:{\"value\":\"$bb\",\"format\":\"body_text\",\"processed\":\"$bc\"}\nb8:{\"drupal_internal__id\":2741,\"drupal_internal__revision_id\":19616,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-03-24T17:50:45+00:00\",\"parent_id\":\"761\",\"parent_type\":\"node\",\"parent_field_name\":\"field_page_section\",\"behavior_settings\":\"$b9\",\"default_langcode\":true,\"revision_translation_affected\":true,\"field_text_block\":\"$ba\"}\nc0:{\"drupal_internal__target_id\":\"page_section\"}\nbf:{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"57f3f40a-8120-4393-b881-a5758f9fb30d\",\"meta\":\"$c0\"}\nc2:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/60a7d525-a81d-4ae7-9349-d7ed4e8588f9/paragraph_type?resourceVersion=id%3A19616\"}\nc3:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/60a7d525-a81d-4ae7-9349-d7ed4e8588f9/relationships/paragraph_type?resourceVersion=id%3A19616\"}\nc1:{\"related\":\"$c2\",\"self\":\"$c3\"}\nbe:{\"data\":\"$bf\",\"links\":\"$c1\"}\nc6:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/60a7d525-a81d-4ae7-9349-d7ed4e8588f9/field_specialty_item?resourceVersion=id%3A19616\"}\nc7:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/60a7d525-a81d-4ae7-9349-d7ed4e8588f9/relationships/field_specialty_item?resourceVersion=id%3A19616\"}\nc5:{\"related\":\"$c6\",\"self\":\"$c7\"}\nc4:{\"data\":null,\"links\":\"$c5\"}\nbd:{\"paragraph_type\":\"$be\",\"field_specialty_item\":\"$c4\"}\nb5:{\"type\":\"paragraph--page_section\",\"id\":\"60a7d525-a81d-4ae7-9349-d7ed4e8588f9\",\"links\":\"$b6\",\"attributes\":\"$b8\",\"relationships\":\"$bd\"}\nca:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/call_out_box/2b4d5747-72a7-446d-a7cb-116571fc4cdb?resourceVersion=id%3A19604\"}\nc9:{\"self\":\"$ca\"}\ncc:[]\ncd:{\"value\":\"If you want to request a mentor or become a mentor, send an email to the ISSO Support Team: ISSO@cms.hhs.gov and include the word \\\"Mentorship\\\" in the subject line.\",\"format\":\"plain_text\",\"processed\":\"\u003cp\u003eIf you want to request a mentor or become a mentor, send an email to the ISSO Support Team: \u003ca href=\\\"mailto:ISSO@cms.hhs.gov\\\"\u003eISSO@cms.hhs.gov\u003c/a\u003e and include the w"])</script><script>self.__next_f.push([1,"ord \u0026quot;Mentorship\u0026quot; in the subject line.\u003c/p\u003e\\n\"}\ncb:{\"drupal_internal__id\":2606,\"drupal_internal__revision_id\":19604,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-03-24T17:31:44+00:00\",\"parent_id\":\"2296\",\"parent_type\":\"paragraph\",\"parent_field_name\":\"field_specialty_item\",\"behavior_settings\":\"$cc\",\"default_langcode\":true,\"revision_translation_affected\":true,\"field_call_out_link\":null,\"field_call_out_link_text\":null,\"field_call_out_text\":\"$cd\",\"field_header\":\"Get started with ISSO mentorship\"}\nd1:{\"drupal_internal__target_id\":\"call_out_box\"}\nd0:{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"a1d0a205-c6c9-4816-b701-4763d05de8e8\",\"meta\":\"$d1\"}\nd3:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/call_out_box/2b4d5747-72a7-446d-a7cb-116571fc4cdb/paragraph_type?resourceVersion=id%3A19604\"}\nd4:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/call_out_box/2b4d5747-72a7-446d-a7cb-116571fc4cdb/relationships/paragraph_type?resourceVersion=id%3A19604\"}\nd2:{\"related\":\"$d3\",\"self\":\"$d4\"}\ncf:{\"data\":\"$d0\",\"links\":\"$d2\"}\nce:{\"paragraph_type\":\"$cf\"}\nc8:{\"type\":\"paragraph--call_out_box\",\"id\":\"2b4d5747-72a7-446d-a7cb-116571fc4cdb\",\"links\":\"$c9\",\"attributes\":\"$cb\",\"relationships\":\"$ce\"}\nd7:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list/4b0acb88-c6ef-4d05-89d7-30df164aa5a4?resourceVersion=id%3A19614\"}\nd6:{\"self\":\"$d7\"}\nd9:[]\nd8:{\"drupal_internal__id\":2731,\"drupal_internal__revision_id\":19614,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-03-24T17:45:48+00:00\",\"parent_id\":\"2736\",\"parent_type\":\"paragraph\",\"parent_field_name\":\"field_specialty_item\",\"behavior_settings\":\"$d9\",\"default_langcode\":true,\"revision_translation_affected\":true,\"field_process_list_conclusion\":null}\ndd:{\"drupal_internal__target_id\":\"process_list\"}\ndc:{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"8a1fa202-0dc7-4f58-9b3d-7f9c44c9a9c8\",\"meta\":\"$dd\"}\ndf:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list/4b0acb88-c6ef-4d05-89d7-30df164aa5a4/paragraph_type?resourceVersion=id%3A19614\"}\ne0:{\"href\":\"https://cybergeek.cms."])</script><script>self.__next_f.push([1,"gov/jsonapi/paragraph/process_list/4b0acb88-c6ef-4d05-89d7-30df164aa5a4/relationships/paragraph_type?resourceVersion=id%3A19614\"}\nde:{\"related\":\"$df\",\"self\":\"$e0\"}\ndb:{\"data\":\"$dc\",\"links\":\"$de\"}\ne4:{\"target_revision_id\":19607,\"drupal_internal__target_id\":2696}\ne3:{\"type\":\"paragraph--process_list_item\",\"id\":\"a4baddfe-ce49-4df9-a909-9d6ae8078323\",\"meta\":\"$e4\"}\ne6:{\"target_revision_id\":19608,\"drupal_internal__target_id\":2701}\ne5:{\"type\":\"paragraph--process_list_item\",\"id\":\"e881744c-12c1-4b30-9885-398fadf2c308\",\"meta\":\"$e6\"}\ne8:{\"target_revision_id\":19609,\"drupal_internal__target_id\":2706}\ne7:{\"type\":\"paragraph--process_list_item\",\"id\":\"df8d9149-24be-4705-8698-d4da851cbe49\",\"meta\":\"$e8\"}\nea:{\"target_revision_id\":19610,\"drupal_internal__target_id\":2711}\ne9:{\"type\":\"paragraph--process_list_item\",\"id\":\"0f611e01-2e5c-4f28-91ad-d61831dfff0f\",\"meta\":\"$ea\"}\nec:{\"target_revision_id\":19611,\"drupal_internal__target_id\":2716}\neb:{\"type\":\"paragraph--process_list_item\",\"id\":\"b8a0c0a0-44a6-4645-bc16-1463f93b6b7f\",\"meta\":\"$ec\"}\nee:{\"target_revision_id\":19612,\"drupal_internal__target_id\":2721}\ned:{\"type\":\"paragraph--process_list_item\",\"id\":\"1a8a9142-5741-4f18-9f28-b006d8ca98ed\",\"meta\":\"$ee\"}\nf0:{\"target_revision_id\":19613,\"drupal_internal__target_id\":2726}\nef:{\"type\":\"paragraph--process_list_item\",\"id\":\"364672e0-a233-47a2-9308-75082fefebc2\",\"meta\":\"$f0\"}\ne2:[\"$e3\",\"$e5\",\"$e7\",\"$e9\",\"$eb\",\"$ed\",\"$ef\"]\nf2:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list/4b0acb88-c6ef-4d05-89d7-30df164aa5a4/field_process_list_item?resourceVersion=id%3A19614\"}\nf3:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list/4b0acb88-c6ef-4d05-89d7-30df164aa5a4/relationships/field_process_list_item?resourceVersion=id%3A19614\"}\nf1:{\"related\":\"$f2\",\"self\":\"$f3\"}\ne1:{\"data\":\"$e2\",\"links\":\"$f1\"}\nda:{\"paragraph_type\":\"$db\",\"field_process_list_item\":\"$e1\"}\nd5:{\"type\":\"paragraph--process_list\",\"id\":\"4b0acb88-c6ef-4d05-89d7-30df164aa5a4\",\"links\":\"$d6\",\"attributes\":\"$d8\",\"relationships\":\"$da\"}\nf6:{\"href\":\"https://cybergeek.cms.gov/jsonapi/pa"])</script><script>self.__next_f.push([1,"ragraph/process_list_item/a4baddfe-ce49-4df9-a909-9d6ae8078323?resourceVersion=id%3A19607\"}\nf5:{\"self\":\"$f6\"}\nf8:[]\nf9:{\"value\":\"\u003cp\u003eAs a mentor, think about what you can offer and how you would like to help other ISSOs. As a mentee, consider specific skills or knowledge you want to gain. Setting goals and desired outcomes from the beginning will ensure a more effective partnership.\u003c/p\u003e\\r\\n\",\"format\":\"main_point_html\",\"processed\":\"\u003cp\u003eAs a mentor, think about what you can offer and how you would like to help other ISSOs. As a mentee, consider specific skills or knowledge you want to gain. Setting goals and desired outcomes from the beginning will ensure a more effective partnership.\u003c/p\u003e\"}\nf7:{\"drupal_internal__id\":2696,\"drupal_internal__revision_id\":19607,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-03-24T17:45:48+00:00\",\"parent_id\":\"2731\",\"parent_type\":\"paragraph\",\"parent_field_name\":\"field_process_list_item\",\"behavior_settings\":\"$f8\",\"default_langcode\":true,\"revision_translation_affected\":true,\"field_list_item_description\":\"$f9\",\"field_list_item_title\":\"Decide on your goals\"}\nfd:{\"drupal_internal__target_id\":\"process_list_item\"}\nfc:{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"169b4697-c521-4a95-b21a-aa0d3f051203\",\"meta\":\"$fd\"}\nff:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/a4baddfe-ce49-4df9-a909-9d6ae8078323/paragraph_type?resourceVersion=id%3A19607\"}\n100:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/a4baddfe-ce49-4df9-a909-9d6ae8078323/relationships/paragraph_type?resourceVersion=id%3A19607\"}\nfe:{\"related\":\"$ff\",\"self\":\"$100\"}\nfb:{\"data\":\"$fc\",\"links\":\"$fe\"}\nfa:{\"paragraph_type\":\"$fb\"}\nf4:{\"type\":\"paragraph--process_list_item\",\"id\":\"a4baddfe-ce49-4df9-a909-9d6ae8078323\",\"links\":\"$f5\",\"attributes\":\"$f7\",\"relationships\":\"$fa\"}\n103:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/e881744c-12c1-4b30-9885-398fadf2c308?resourceVersion=id%3A19608\"}\n102:{\"self\":\"$103\"}\n105:[]\n106:{\"value\":\"\u003cp\u003eAnyone who participates in mentorship must get ap"])</script><script>self.__next_f.push([1,"proval from their manager. Though the time commitment is flexible, it will require some investment and could result in periods of reduced availability for day to day work. As a mentor or mentee, make sure your manager understands and approves of your planned level of participation in the program.\u003c/p\u003e\\r\\n\",\"format\":\"main_point_html\",\"processed\":\"\u003cp\u003eAnyone who participates in mentorship must get approval from their manager. Though the time commitment is flexible, it will require some investment and could result in periods of reduced availability for day to day work. As a mentor or mentee, make sure your manager understands and approves of your planned level of participation in the program.\u003c/p\u003e\"}\n104:{\"drupal_internal__id\":2701,\"drupal_internal__revision_id\":19608,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-03-24T17:46:10+00:00\",\"parent_id\":\"2731\",\"parent_type\":\"paragraph\",\"parent_field_name\":\"field_process_list_item\",\"behavior_settings\":\"$105\",\"default_langcode\":true,\"revision_translation_affected\":true,\"field_list_item_description\":\"$106\",\"field_list_item_title\":\"Get manager approval\"}\n10a:{\"drupal_internal__target_id\":\"process_list_item\"}\n109:{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"169b4697-c521-4a95-b21a-aa0d3f051203\",\"meta\":\"$10a\"}\n10c:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/e881744c-12c1-4b30-9885-398fadf2c308/paragraph_type?resourceVersion=id%3A19608\"}\n10d:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/e881744c-12c1-4b30-9885-398fadf2c308/relationships/paragraph_type?resourceVersion=id%3A19608\"}\n10b:{\"related\":\"$10c\",\"self\":\"$10d\"}\n108:{\"data\":\"$109\",\"links\":\"$10b\"}\n107:{\"paragraph_type\":\"$108\"}\n101:{\"type\":\"paragraph--process_list_item\",\"id\":\"e881744c-12c1-4b30-9885-398fadf2c308\",\"links\":\"$102\",\"attributes\":\"$104\",\"relationships\":\"$107\"}\n110:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/df8d9149-24be-4705-8698-d4da851cbe49?resourceVersion=id%3A19609\"}\n10f:{\"self\":\"$110\"}\n112:[]\n113:{\"value\":\"\u003cp\u003eGetting started with ISS"])</script><script>self.__next_f.push([1,"O mentorship is easy. Just send an email to \u003ca href=\\\"mailto:ISSO@cms.hhs.gov\\\"\u003eISSO@cms.hhs.gov\u003c/a\u003e and include the word \u003cstrong\u003eMentorship\u003c/strong\u003e in the subject line. Someone will contact you to set up an initial orientation meeting.\u003c/p\u003e\\r\\n\",\"format\":\"main_point_html\",\"processed\":\"\u003cp\u003eGetting started with ISSO mentorship is easy. Just send an email to \u003ca href=\\\"mailto:ISSO@cms.hhs.gov\\\"\u003eISSO@cms.hhs.gov\u003c/a\u003e and include the word \u003cstrong\u003eMentorship\u003c/strong\u003e in the subject line. Someone will contact you to set up an initial orientation meeting.\u003c/p\u003e\"}\n111:{\"drupal_internal__id\":2706,\"drupal_internal__revision_id\":19609,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-03-24T17:47:10+00:00\",\"parent_id\":\"2731\",\"parent_type\":\"paragraph\",\"parent_field_name\":\"field_process_list_item\",\"behavior_settings\":\"$112\",\"default_langcode\":true,\"revision_translation_affected\":true,\"field_list_item_description\":\"$113\",\"field_list_item_title\":\"Send a request to the ISSO team\"}\n117:{\"drupal_internal__target_id\":\"process_list_item\"}\n116:{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"169b4697-c521-4a95-b21a-aa0d3f051203\",\"meta\":\"$117\"}\n119:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/df8d9149-24be-4705-8698-d4da851cbe49/paragraph_type?resourceVersion=id%3A19609\"}\n11a:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/df8d9149-24be-4705-8698-d4da851cbe49/relationships/paragraph_type?resourceVersion=id%3A19609\"}\n118:{\"related\":\"$119\",\"self\":\"$11a\"}\n115:{\"data\":\"$116\",\"links\":\"$118\"}\n114:{\"paragraph_type\":\"$115\"}\n10e:{\"type\":\"paragraph--process_list_item\",\"id\":\"df8d9149-24be-4705-8698-d4da851cbe49\",\"links\":\"$10f\",\"attributes\":\"$111\",\"relationships\":\"$114\"}\n11d:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/0f611e01-2e5c-4f28-91ad-d61831dfff0f?resourceVersion=id%3A19610\"}\n11c:{\"self\":\"$11d\"}\n11f:[]\n120:{\"value\":\"\u003cp\u003eThe ISSO Support Team meets with a potential mentor or mentee to introduce them to the program and learn about the individuals goals for participation and "])</script><script>self.__next_f.push([1,"learning. Allow about an hour for this meeting. It will help you know what to expect, how to get assistance if needed, and how to plan an effective engagement from beginning to end. After orientation, the ISSO Support Team will have the information they need to find an appropriate match (either a mentor or mentee) for you.\u003c/p\u003e\\r\\n\",\"format\":\"main_point_html\",\"processed\":\"\u003cp\u003eThe ISSO Support Team meets with a potential mentor or mentee to introduce them to the program and learn about the individuals goals for participation and learning. Allow about an hour for this meeting. It will help you know what to expect, how to get assistance if needed, and how to plan an effective engagement from beginning to end. After orientation, the ISSO Support Team will have the information they need to find an appropriate match (either a mentor or mentee) for you.\u003c/p\u003e\"}\n11e:{\"drupal_internal__id\":2711,\"drupal_internal__revision_id\":19610,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-03-24T17:47:38+00:00\",\"parent_id\":\"2731\",\"parent_type\":\"paragraph\",\"parent_field_name\":\"field_process_list_item\",\"behavior_settings\":\"$11f\",\"default_langcode\":true,\"revision_translation_affected\":true,\"field_list_item_description\":\"$120\",\"field_list_item_title\":\"Complete orientation\"}\n124:{\"drupal_internal__target_id\":\"process_list_item\"}\n123:{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"169b4697-c521-4a95-b21a-aa0d3f051203\",\"meta\":\"$124\"}\n126:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/0f611e01-2e5c-4f28-91ad-d61831dfff0f/paragraph_type?resourceVersion=id%3A19610\"}\n127:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/0f611e01-2e5c-4f28-91ad-d61831dfff0f/relationships/paragraph_type?resourceVersion=id%3A19610\"}\n125:{\"related\":\"$126\",\"self\":\"$127\"}\n122:{\"data\":\"$123\",\"links\":\"$125\"}\n121:{\"paragraph_type\":\"$122\"}\n11b:{\"type\":\"paragraph--process_list_item\",\"id\":\"0f611e01-2e5c-4f28-91ad-d61831dfff0f\",\"links\":\"$11c\",\"attributes\":\"$11e\",\"relationships\":\"$121\"}\n12a:{\"href\":\"https://cybergeek.cms.gov/jsonapi"])</script><script>self.__next_f.push([1,"/paragraph/process_list_item/b8a0c0a0-44a6-4645-bc16-1463f93b6b7f?resourceVersion=id%3A19611\"}\n129:{\"self\":\"$12a\"}\n12c:[]\n12d:{\"value\":\"\u003cp\u003eOnce you are put in touch with your mentorship partner, schedule your first meeting so you can get to know each other. This can be scheduled by either the mentor or mentee. Both should come prepared to discuss goals and desired outcomes for the engagement, along with logistic preferences such as meeting cadence and location. Take the time to make this meeting count! Whether you meet in person or virtually, try to reduce distractions and bring your full focus.\u003c/p\u003e\\r\\n\",\"format\":\"main_point_html\",\"processed\":\"\u003cp\u003eOnce you are put in touch with your mentorship partner, schedule your first meeting so you can get to know each other. This can be scheduled by either the mentor or mentee. Both should come prepared to discuss goals and desired outcomes for the engagement, along with logistic preferences such as meeting cadence and location. Take the time to make this meeting count! Whether you meet in person or virtually, try to reduce distractions and bring your full focus.\u003c/p\u003e\"}\n12b:{\"drupal_internal__id\":2716,\"drupal_internal__revision_id\":19611,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-03-24T17:48:01+00:00\",\"parent_id\":\"2731\",\"parent_type\":\"paragraph\",\"parent_field_name\":\"field_process_list_item\",\"behavior_settings\":\"$12c\",\"default_langcode\":true,\"revision_translation_affected\":true,\"field_list_item_description\":\"$12d\",\"field_list_item_title\":\"Meet with your mentor / mentee\"}\n131:{\"drupal_internal__target_id\":\"process_list_item\"}\n130:{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"169b4697-c521-4a95-b21a-aa0d3f051203\",\"meta\":\"$131\"}\n133:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/b8a0c0a0-44a6-4645-bc16-1463f93b6b7f/paragraph_type?resourceVersion=id%3A19611\"}\n134:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/b8a0c0a0-44a6-4645-bc16-1463f93b6b7f/relationships/paragraph_type?resourceVersion=id%3A19611\"}\n132:{\"related\":\"$133\",\"se"])</script><script>self.__next_f.push([1,"lf\":\"$134\"}\n12f:{\"data\":\"$130\",\"links\":\"$132\"}\n12e:{\"paragraph_type\":\"$12f\"}\n128:{\"type\":\"paragraph--process_list_item\",\"id\":\"b8a0c0a0-44a6-4645-bc16-1463f93b6b7f\",\"links\":\"$129\",\"attributes\":\"$12b\",\"relationships\":\"$12e\"}\n137:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/1a8a9142-5741-4f18-9f28-b006d8ca98ed?resourceVersion=id%3A19612\"}\n136:{\"self\":\"$137\"}\n139:[]\n13a:{\"value\":\"\u003cp\u003eShare your preferred ways of communicating and decide what works best for both of you. This could be virtual meetings, email notes, telephone calls, in-person meetings, or a combination. Make sure to note any times of non-availability (such as flex days). A weekly cadence is encouraged to keep up your momentum, but the arrangement is flexible and can be adjusted as needed. Regardless, you should give your mentorship meetings a high priority and your thoughtful attention.\u003c/p\u003e\\r\\n\",\"format\":\"main_point_html\",\"processed\":\"\u003cp\u003eShare your preferred ways of communicating and decide what works best for both of you. This could be virtual meetings, email notes, telephone calls, in-person meetings, or a combination. Make sure to note any times of non-availability (such as flex days). A weekly cadence is encouraged to keep up your momentum, but the arrangement is flexible and can be adjusted as needed. Regardless, you should give your mentorship meetings a high priority and your thoughtful attention.\u003c/p\u003e\"}\n138:{\"drupal_internal__id\":2721,\"drupal_internal__revision_id\":19612,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-03-24T17:48:24+00:00\",\"parent_id\":\"2731\",\"parent_type\":\"paragraph\",\"parent_field_name\":\"field_process_list_item\",\"behavior_settings\":\"$139\",\"default_langcode\":true,\"revision_translation_affected\":true,\"field_list_item_description\":\"$13a\",\"field_list_item_title\":\"Establish format and frequency\"}\n13e:{\"drupal_internal__target_id\":\"process_list_item\"}\n13d:{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"169b4697-c521-4a95-b21a-aa0d3f051203\",\"meta\":\"$13e\"}\n140:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/p"])</script><script>self.__next_f.push([1,"rocess_list_item/1a8a9142-5741-4f18-9f28-b006d8ca98ed/paragraph_type?resourceVersion=id%3A19612\"}\n141:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/1a8a9142-5741-4f18-9f28-b006d8ca98ed/relationships/paragraph_type?resourceVersion=id%3A19612\"}\n13f:{\"related\":\"$140\",\"self\":\"$141\"}\n13c:{\"data\":\"$13d\",\"links\":\"$13f\"}\n13b:{\"paragraph_type\":\"$13c\"}\n135:{\"type\":\"paragraph--process_list_item\",\"id\":\"1a8a9142-5741-4f18-9f28-b006d8ca98ed\",\"links\":\"$136\",\"attributes\":\"$138\",\"relationships\":\"$13b\"}\n144:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/364672e0-a233-47a2-9308-75082fefebc2?resourceVersion=id%3A19613\"}\n143:{\"self\":\"$144\"}\n146:[]\n147:{\"value\":\"\u003cp\u003eAs you begin sharing and learning together on a regular basis, you may decide to adjust your schedule, methods, or even goals. This is fine, as long as you both feel that the partnership is still beneficial. At the beginning, you should set a time frame for the engagement (based on the desired outcomes), but this is also subject to change if mutually agreed upon. Check in frequently, communicate clearly, and feel free to reach out to the ISSO Support Team if either of you needs assistance along the way!\u003c/p\u003e\\r\\n\",\"format\":\"main_point_html\",\"processed\":\"\u003cp\u003eAs you begin sharing and learning together on a regular basis, you may decide to adjust your schedule, methods, or even goals. This is fine, as long as you both feel that the partnership is still beneficial. At the beginning, you should set a time frame for the engagement (based on the desired outcomes), but this is also subject to change if mutually agreed upon. Check in frequently, communicate clearly, and feel free to reach out to the ISSO Support Team if either of you needs assistance along the way!\u003c/p\u003e\"}\n145:{\"drupal_internal__id\":2726,\"drupal_internal__revision_id\":19613,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-03-24T17:48:52+00:00\",\"parent_id\":\"2731\",\"parent_type\":\"paragraph\",\"parent_field_name\":\"field_process_list_item\",\"behavior_settings\":\"$146\",\"default_langcod"])</script><script>self.__next_f.push([1,"e\":true,\"revision_translation_affected\":true,\"field_list_item_description\":\"$147\",\"field_list_item_title\":\"Start your mentorship journey\"}\n14b:{\"drupal_internal__target_id\":\"process_list_item\"}\n14a:{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"169b4697-c521-4a95-b21a-aa0d3f051203\",\"meta\":\"$14b\"}\n14d:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/364672e0-a233-47a2-9308-75082fefebc2/paragraph_type?resourceVersion=id%3A19613\"}\n14e:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/364672e0-a233-47a2-9308-75082fefebc2/relationships/paragraph_type?resourceVersion=id%3A19613\"}\n14c:{\"related\":\"$14d\",\"self\":\"$14e\"}\n149:{\"data\":\"$14a\",\"links\":\"$14c\"}\n148:{\"paragraph_type\":\"$149\"}\n142:{\"type\":\"paragraph--process_list_item\",\"id\":\"364672e0-a233-47a2-9308-75082fefebc2\",\"links\":\"$143\",\"attributes\":\"$145\",\"relationships\":\"$148\"}\n"])</script><script>self.__next_f.push([1,"5:[\"$\",\"$L17\",null,{\"content\":{\"data\":{\"type\":\"node--explainer\",\"id\":\"a68e4ea1-f969-4cec-a184-89ab67064cf0\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/a68e4ea1-f969-4cec-a184-89ab67064cf0?resourceVersion=id%3A5976\"}},\"attributes\":{\"drupal_internal__nid\":761,\"drupal_internal__vid\":5976,\"langcode\":\"en\",\"revision_timestamp\":\"2024-11-27T17:31:01+00:00\",\"status\":true,\"title\":\"ISSO Mentorship Program\",\"created\":\"2023-03-01T16:12:36+00:00\",\"changed\":\"2024-11-26T16:12:39+00:00\",\"promote\":false,\"sticky\":false,\"default_langcode\":true,\"revision_translation_affected\":true,\"moderation_state\":\"published\",\"path\":{\"alias\":\"/learn/isso-mentorship-program\",\"pid\":741,\"langcode\":\"en\"},\"rh_action\":null,\"rh_redirect\":null,\"rh_redirect_response\":null,\"rh_redirect_fallback_action\":null,\"publish_on\":null,\"unpublish_on\":null,\"body\":null,\"field_contact_email\":\"ISSO@cms.hhs.gov\",\"field_contact_name\":\"ISSO Support Team\",\"field_short_description\":{\"value\":\"ISPG program that pairs CMS Information System Security Officers (ISSOs) with their peers for knowledge sharing and support\",\"format\":\"plain_text\",\"processed\":\"\u003cp\u003eISPG program that pairs CMS Information System Security Officers (ISSOs) with their peers for knowledge sharing and support\u003c/p\u003e\\n\"},\"field_slack_channel\":[\"#cms-isso\"]},\"relationships\":{\"node_type\":{\"data\":{\"type\":\"node_type--node_type\",\"id\":\"d185e460-4998-4d2b-85cb-b04f304dfb1b\",\"meta\":{\"drupal_internal__target_id\":\"explainer\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/a68e4ea1-f969-4cec-a184-89ab67064cf0/node_type?resourceVersion=id%3A5976\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/a68e4ea1-f969-4cec-a184-89ab67064cf0/relationships/node_type?resourceVersion=id%3A5976\"}}},\"revision_uid\":{\"data\":{\"type\":\"user--user\",\"id\":\"3621116d-42ad-4630-8ff7-ec6dda4bc633\",\"meta\":{\"drupal_internal__target_id\":118}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/a68e4ea1-f969-4cec-a184-89ab67064cf0/revision_uid?resourceVersion=id%3A5976\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/a68e4ea1-f969-4cec-a184-89ab67064cf0/relationships/revision_uid?resourceVersion=id%3A5976\"}}},\"uid\":{\"data\":{\"type\":\"user--user\",\"id\":\"e352e203-fe9c-47ba-af75-2c7f8302fca8\",\"meta\":{\"drupal_internal__target_id\":6}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/a68e4ea1-f969-4cec-a184-89ab67064cf0/uid?resourceVersion=id%3A5976\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/a68e4ea1-f969-4cec-a184-89ab67064cf0/relationships/uid?resourceVersion=id%3A5976\"}}},\"field_page_section\":{\"data\":[{\"type\":\"paragraph--page_section\",\"id\":\"f9ca6b9e-0b66-4c42-aa2c-2ff997c11894\",\"meta\":{\"target_revision_id\":19605,\"drupal_internal__target_id\":2296}},{\"type\":\"paragraph--page_section\",\"id\":\"1c38d685-2704-4e1f-921d-3b1ed5737b6f\",\"meta\":{\"target_revision_id\":19606,\"drupal_internal__target_id\":2636}},{\"type\":\"paragraph--page_section\",\"id\":\"e1397bac-2738-4de5-9e57-6f09f6751d42\",\"meta\":{\"target_revision_id\":19615,\"drupal_internal__target_id\":2736}},{\"type\":\"paragraph--page_section\",\"id\":\"60a7d525-a81d-4ae7-9349-d7ed4e8588f9\",\"meta\":{\"target_revision_id\":19616,\"drupal_internal__target_id\":2741}}],\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/a68e4ea1-f969-4cec-a184-89ab67064cf0/field_page_section?resourceVersion=id%3A5976\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/a68e4ea1-f969-4cec-a184-89ab67064cf0/relationships/field_page_section?resourceVersion=id%3A5976\"}}},\"field_related_collection\":{\"data\":[],\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/a68e4ea1-f969-4cec-a184-89ab67064cf0/field_related_collection?resourceVersion=id%3A5976\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/a68e4ea1-f969-4cec-a184-89ab67064cf0/relationships/field_related_collection?resourceVersion=id%3A5976\"}}},\"field_resource_type\":{\"data\":{\"type\":\"taxonomy_term--resource_type\",\"id\":\"9e907eeb-b0a8-4dd3-8818-37cb1557a8f4\",\"meta\":{\"drupal_internal__target_id\":121}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/a68e4ea1-f969-4cec-a184-89ab67064cf0/field_resource_type?resourceVersion=id%3A5976\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/a68e4ea1-f969-4cec-a184-89ab67064cf0/relationships/field_resource_type?resourceVersion=id%3A5976\"}}},\"field_roles\":{\"data\":[{\"type\":\"taxonomy_term--roles\",\"id\":\"7a18463d-b0fc-474f-8536-ad7db1b2e5ab\",\"meta\":{\"drupal_internal__target_id\":61}}],\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/a68e4ea1-f969-4cec-a184-89ab67064cf0/field_roles?resourceVersion=id%3A5976\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/a68e4ea1-f969-4cec-a184-89ab67064cf0/relationships/field_roles?resourceVersion=id%3A5976\"}}},\"field_topics\":{\"data\":[{\"type\":\"taxonomy_term--topics\",\"id\":\"8b8ffea0-3b0b-404d-8442-7f3a4602482d\",\"meta\":{\"drupal_internal__target_id\":56}}],\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/a68e4ea1-f969-4cec-a184-89ab67064cf0/field_topics?resourceVersion=id%3A5976\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/a68e4ea1-f969-4cec-a184-89ab67064cf0/relationships/field_topics?resourceVersion=id%3A5976\"}}}}},\"included\":[{\"type\":\"node_type--node_type\",\"id\":\"d185e460-4998-4d2b-85cb-b04f304dfb1b\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node_type/node_type/d185e460-4998-4d2b-85cb-b04f304dfb1b\"}},\"attributes\":{\"langcode\":\"en\",\"status\":true,\"dependencies\":{\"module\":[\"menu_ui\",\"scheduler\"]},\"third_party_settings\":{\"menu_ui\":{\"available_menus\":[],\"parent\":\"\"},\"scheduler\":{\"expand_fieldset\":\"when_required\",\"fields_display_mode\":\"vertical_tab\",\"publish_enable\":false,\"publish_past_date\":\"error\",\"publish_past_date_created\":false,\"publish_required\":false,\"publish_revision\":false,\"publish_touch\":false,\"show_message_after_update\":true,\"unpublish_enable\":false,\"unpublish_required\":false,\"unpublish_revision\":false}},\"name\":\"Explainer page\",\"drupal_internal__type\":\"explainer\",\"description\":\"Use \u003ci\u003eExplainer pages\u003c/i\u003e to provide general information in plain language about a policy, program, tool, service, or task related to security and privacy at CMS.\",\"help\":null,\"new_revision\":true,\"preview_mode\":1,\"display_submitted\":true}},{\"type\":\"user--user\",\"id\":\"3621116d-42ad-4630-8ff7-ec6dda4bc633\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/user/user/3621116d-42ad-4630-8ff7-ec6dda4bc633\"}},\"attributes\":{\"display_name\":\"dbartley\"}},{\"type\":\"user--user\",\"id\":\"e352e203-fe9c-47ba-af75-2c7f8302fca8\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/user/user/e352e203-fe9c-47ba-af75-2c7f8302fca8\"}},\"attributes\":{\"display_name\":\"mburgess\"}},{\"type\":\"taxonomy_term--resource_type\",\"id\":\"9e907eeb-b0a8-4dd3-8818-37cb1557a8f4\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/9e907eeb-b0a8-4dd3-8818-37cb1557a8f4?resourceVersion=id%3A121\"}},\"attributes\":{\"drupal_internal__tid\":121,\"drupal_internal__revision_id\":121,\"langcode\":\"en\",\"revision_created\":\"2022-08-02T23:13:12+00:00\",\"status\":true,\"name\":\"Tools / Services\",\"description\":null,\"weight\":5,\"changed\":\"2023-06-14T19:04:09+00:00\",\"default_langcode\":true,\"revision_translation_affected\":true,\"path\":{\"alias\":null,\"pid\":null,\"langcode\":\"en\"}},\"relationships\":{\"vid\":{\"data\":{\"type\":\"taxonomy_vocabulary--taxonomy_vocabulary\",\"id\":\"3a0127c4-ee06-41ed-8239-f796f6d78eb3\",\"meta\":{\"drupal_internal__target_id\":\"resource_type\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/9e907eeb-b0a8-4dd3-8818-37cb1557a8f4/vid?resourceVersion=id%3A121\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/9e907eeb-b0a8-4dd3-8818-37cb1557a8f4/relationships/vid?resourceVersion=id%3A121\"}}},\"revision_user\":{\"data\":null,\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/9e907eeb-b0a8-4dd3-8818-37cb1557a8f4/revision_user?resourceVersion=id%3A121\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/9e907eeb-b0a8-4dd3-8818-37cb1557a8f4/relationships/revision_user?resourceVersion=id%3A121\"}}},\"parent\":{\"data\":[{\"type\":\"taxonomy_term--resource_type\",\"id\":\"virtual\",\"meta\":{\"links\":{\"help\":{\"href\":\"https://www.drupal.org/docs/8/modules/json-api/core-concepts#virtual\",\"meta\":{\"about\":\"Usage and meaning of the 'virtual' resource identifier.\"}}}}}],\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/9e907eeb-b0a8-4dd3-8818-37cb1557a8f4/parent?resourceVersion=id%3A121\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/9e907eeb-b0a8-4dd3-8818-37cb1557a8f4/relationships/parent?resourceVersion=id%3A121\"}}}}},{\"type\":\"taxonomy_term--roles\",\"id\":\"7a18463d-b0fc-474f-8536-ad7db1b2e5ab\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab?resourceVersion=id%3A61\"}},\"attributes\":{\"drupal_internal__tid\":61,\"drupal_internal__revision_id\":61,\"langcode\":\"en\",\"revision_created\":\"2022-08-02T23:08:12+00:00\",\"status\":true,\"name\":\"Information System Security Officer (ISSO)\",\"description\":null,\"weight\":0,\"changed\":\"2022-08-02T23:08:12+00:00\",\"default_langcode\":true,\"revision_translation_affected\":true,\"path\":{\"alias\":null,\"pid\":null,\"langcode\":\"en\"}},\"relationships\":{\"vid\":{\"data\":{\"type\":\"taxonomy_vocabulary--taxonomy_vocabulary\",\"id\":\"a89af840-d1f0-4a08-9f15-7b1cb71c3e35\",\"meta\":{\"drupal_internal__target_id\":\"roles\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab/vid?resourceVersion=id%3A61\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab/relationships/vid?resourceVersion=id%3A61\"}}},\"revision_user\":{\"data\":null,\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab/revision_user?resourceVersion=id%3A61\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab/relationships/revision_user?resourceVersion=id%3A61\"}}},\"parent\":{\"data\":[{\"type\":\"taxonomy_term--roles\",\"id\":\"virtual\",\"meta\":{\"links\":{\"help\":{\"href\":\"https://www.drupal.org/docs/8/modules/json-api/core-concepts#virtual\",\"meta\":{\"about\":\"Usage and meaning of the 'virtual' resource identifier.\"}}}}}],\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab/parent?resourceVersion=id%3A61\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab/relationships/parent?resourceVersion=id%3A61\"}}}}},{\"type\":\"taxonomy_term--topics\",\"id\":\"8b8ffea0-3b0b-404d-8442-7f3a4602482d\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d?resourceVersion=id%3A56\"}},\"attributes\":{\"drupal_internal__tid\":56,\"drupal_internal__revision_id\":56,\"langcode\":\"en\",\"revision_created\":\"2022-08-02T23:06:35+00:00\",\"status\":true,\"name\":\"Training \u0026 Awareness\",\"description\":null,\"weight\":8,\"changed\":\"2024-06-14T17:38:33+00:00\",\"default_langcode\":true,\"revision_translation_affected\":true,\"path\":{\"alias\":null,\"pid\":null,\"langcode\":\"en\"}},\"relationships\":{\"vid\":{\"data\":{\"type\":\"taxonomy_vocabulary--taxonomy_vocabulary\",\"id\":\"73f89dec-123f-4c8c-9a97-d025a2b0e5cf\",\"meta\":{\"drupal_internal__target_id\":\"topics\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d/vid?resourceVersion=id%3A56\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d/relationships/vid?resourceVersion=id%3A56\"}}},\"revision_user\":{\"data\":null,\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d/revision_user?resourceVersion=id%3A56\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d/relationships/revision_user?resourceVersion=id%3A56\"}}},\"parent\":{\"data\":[{\"type\":\"taxonomy_term--topics\",\"id\":\"virtual\",\"meta\":{\"links\":{\"help\":{\"href\":\"https://www.drupal.org/docs/8/modules/json-api/core-concepts#virtual\",\"meta\":{\"about\":\"Usage and meaning of the 'virtual' resource identifier.\"}}}}}],\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d/parent?resourceVersion=id%3A56\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d/relationships/parent?resourceVersion=id%3A56\"}}}}},{\"type\":\"paragraph--page_section\",\"id\":\"f9ca6b9e-0b66-4c42-aa2c-2ff997c11894\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/f9ca6b9e-0b66-4c42-aa2c-2ff997c11894?resourceVersion=id%3A19605\"}},\"attributes\":{\"drupal_internal__id\":2296,\"drupal_internal__revision_id\":19605,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-03-01T16:13:37+00:00\",\"parent_id\":\"761\",\"parent_type\":\"node\",\"parent_field_name\":\"field_page_section\",\"behavior_settings\":[],\"default_langcode\":true,\"revision_translation_affected\":true,\"field_text_block\":{\"value\":\"\u003ch2\u003e\u003cstrong\u003eWhat is the ISSO Mentorship Program?\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eThe CMS ISSO Mentorship Program seeks to improve the overall readiness and skill of Information System Security Officers (ISSOs) at CMS by creating opportunities for knowledge sharing and support among ISSOs of all experience levels. Both mentors and mentees benefit from a partnership that is structured enough to provide growth towards defined goals yet flexible enough that anyone can participate.\u003c/p\u003e\u003cp\u003eBecause the role of an ISSO is critical for ensuring security and privacy compliance for FISMA systems, this program dedicated to helping ISSOs succeed improves the overall security posture and culture at CMS.\u003c/p\u003e\",\"format\":\"body_text\",\"processed\":\"\u003ch2\u003e\u003cstrong\u003eWhat is the ISSO Mentorship Program?\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eThe CMS ISSO Mentorship Program seeks to improve the overall readiness and skill of Information System Security Officers (ISSOs) at CMS by creating opportunities for knowledge sharing and support among ISSOs of all experience levels. Both mentors and mentees benefit from a partnership that is structured enough to provide growth towards defined goals yet flexible enough that anyone can participate.\u003c/p\u003e\u003cp\u003eBecause the role of an ISSO is critical for ensuring security and privacy compliance for FISMA systems, this program dedicated to helping ISSOs succeed improves the overall security posture and culture at CMS.\u003c/p\u003e\"}},\"relationships\":{\"paragraph_type\":{\"data\":{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"57f3f40a-8120-4393-b881-a5758f9fb30d\",\"meta\":{\"drupal_internal__target_id\":\"page_section\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/f9ca6b9e-0b66-4c42-aa2c-2ff997c11894/paragraph_type?resourceVersion=id%3A19605\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/f9ca6b9e-0b66-4c42-aa2c-2ff997c11894/relationships/paragraph_type?resourceVersion=id%3A19605\"}}},\"field_specialty_item\":{\"data\":{\"type\":\"paragraph--call_out_box\",\"id\":\"2b4d5747-72a7-446d-a7cb-116571fc4cdb\",\"meta\":{\"target_revision_id\":19604,\"drupal_internal__target_id\":2606}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/f9ca6b9e-0b66-4c42-aa2c-2ff997c11894/field_specialty_item?resourceVersion=id%3A19605\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/f9ca6b9e-0b66-4c42-aa2c-2ff997c11894/relationships/field_specialty_item?resourceVersion=id%3A19605\"}}}}},{\"type\":\"paragraph--page_section\",\"id\":\"1c38d685-2704-4e1f-921d-3b1ed5737b6f\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/1c38d685-2704-4e1f-921d-3b1ed5737b6f?resourceVersion=id%3A19606\"}},\"attributes\":{\"drupal_internal__id\":2636,\"drupal_internal__revision_id\":19606,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-03-24T17:32:39+00:00\",\"parent_id\":\"761\",\"parent_type\":\"node\",\"parent_field_name\":\"field_page_section\",\"behavior_settings\":[],\"default_langcode\":true,\"revision_translation_affected\":true,\"field_text_block\":{\"value\":\"$18\",\"format\":\"body_text\",\"processed\":\"$19\"}},\"relationships\":{\"paragraph_type\":{\"data\":{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"57f3f40a-8120-4393-b881-a5758f9fb30d\",\"meta\":{\"drupal_internal__target_id\":\"page_section\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/1c38d685-2704-4e1f-921d-3b1ed5737b6f/paragraph_type?resourceVersion=id%3A19606\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/1c38d685-2704-4e1f-921d-3b1ed5737b6f/relationships/paragraph_type?resourceVersion=id%3A19606\"}}},\"field_specialty_item\":{\"data\":null,\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/1c38d685-2704-4e1f-921d-3b1ed5737b6f/field_specialty_item?resourceVersion=id%3A19606\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/1c38d685-2704-4e1f-921d-3b1ed5737b6f/relationships/field_specialty_item?resourceVersion=id%3A19606\"}}}}},{\"type\":\"paragraph--page_section\",\"id\":\"e1397bac-2738-4de5-9e57-6f09f6751d42\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/e1397bac-2738-4de5-9e57-6f09f6751d42?resourceVersion=id%3A19615\"}},\"attributes\":{\"drupal_internal__id\":2736,\"drupal_internal__revision_id\":19615,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-03-24T17:45:33+00:00\",\"parent_id\":\"761\",\"parent_type\":\"node\",\"parent_field_name\":\"field_page_section\",\"behavior_settings\":[],\"default_langcode\":true,\"revision_translation_affected\":true,\"field_text_block\":{\"value\":\"\u003ch2\u003e\u003cstrong\u003eSteps to get started\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eWhether you want to be a mentor or mentee, these are the steps you can take to begin participation in the ISSO Mentorship Program:\u003c/p\u003e\",\"format\":\"body_text\",\"processed\":\"\u003ch2\u003e\u003cstrong\u003eSteps to get started\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eWhether you want to be a mentor or mentee, these are the steps you can take to begin participation in the ISSO Mentorship Program:\u003c/p\u003e\"}},\"relationships\":{\"paragraph_type\":{\"data\":{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"57f3f40a-8120-4393-b881-a5758f9fb30d\",\"meta\":{\"drupal_internal__target_id\":\"page_section\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/e1397bac-2738-4de5-9e57-6f09f6751d42/paragraph_type?resourceVersion=id%3A19615\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/e1397bac-2738-4de5-9e57-6f09f6751d42/relationships/paragraph_type?resourceVersion=id%3A19615\"}}},\"field_specialty_item\":{\"data\":{\"type\":\"paragraph--process_list\",\"id\":\"4b0acb88-c6ef-4d05-89d7-30df164aa5a4\",\"meta\":{\"target_revision_id\":19614,\"drupal_internal__target_id\":2731}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/e1397bac-2738-4de5-9e57-6f09f6751d42/field_specialty_item?resourceVersion=id%3A19615\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/e1397bac-2738-4de5-9e57-6f09f6751d42/relationships/field_specialty_item?resourceVersion=id%3A19615\"}}}}},{\"type\":\"paragraph--page_section\",\"id\":\"60a7d525-a81d-4ae7-9349-d7ed4e8588f9\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/60a7d525-a81d-4ae7-9349-d7ed4e8588f9?resourceVersion=id%3A19616\"}},\"attributes\":{\"drupal_internal__id\":2741,\"drupal_internal__revision_id\":19616,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-03-24T17:50:45+00:00\",\"parent_id\":\"761\",\"parent_type\":\"node\",\"parent_field_name\":\"field_page_section\",\"behavior_settings\":[],\"default_langcode\":true,\"revision_translation_affected\":true,\"field_text_block\":{\"value\":\"$1a\",\"format\":\"body_text\",\"processed\":\"$1b\"}},\"relationships\":{\"paragraph_type\":{\"data\":{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"57f3f40a-8120-4393-b881-a5758f9fb30d\",\"meta\":{\"drupal_internal__target_id\":\"page_section\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/60a7d525-a81d-4ae7-9349-d7ed4e8588f9/paragraph_type?resourceVersion=id%3A19616\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/60a7d525-a81d-4ae7-9349-d7ed4e8588f9/relationships/paragraph_type?resourceVersion=id%3A19616\"}}},\"field_specialty_item\":{\"data\":null,\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/60a7d525-a81d-4ae7-9349-d7ed4e8588f9/field_specialty_item?resourceVersion=id%3A19616\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/60a7d525-a81d-4ae7-9349-d7ed4e8588f9/relationships/field_specialty_item?resourceVersion=id%3A19616\"}}}}},{\"type\":\"paragraph--call_out_box\",\"id\":\"2b4d5747-72a7-446d-a7cb-116571fc4cdb\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/call_out_box/2b4d5747-72a7-446d-a7cb-116571fc4cdb?resourceVersion=id%3A19604\"}},\"attributes\":{\"drupal_internal__id\":2606,\"drupal_internal__revision_id\":19604,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-03-24T17:31:44+00:00\",\"parent_id\":\"2296\",\"parent_type\":\"paragraph\",\"parent_field_name\":\"field_specialty_item\",\"behavior_settings\":[],\"default_langcode\":true,\"revision_translation_affected\":true,\"field_call_out_link\":null,\"field_call_out_link_text\":null,\"field_call_out_text\":{\"value\":\"If you want to request a mentor or become a mentor, send an email to the ISSO Support Team: ISSO@cms.hhs.gov and include the word \\\"Mentorship\\\" in the subject line.\",\"format\":\"plain_text\",\"processed\":\"\u003cp\u003eIf you want to request a mentor or become a mentor, send an email to the ISSO Support Team: \u003ca href=\\\"mailto:ISSO@cms.hhs.gov\\\"\u003eISSO@cms.hhs.gov\u003c/a\u003e and include the word \u0026quot;Mentorship\u0026quot; in the subject line.\u003c/p\u003e\\n\"},\"field_header\":\"Get started with ISSO mentorship\"},\"relationships\":{\"paragraph_type\":{\"data\":{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"a1d0a205-c6c9-4816-b701-4763d05de8e8\",\"meta\":{\"drupal_internal__target_id\":\"call_out_box\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/call_out_box/2b4d5747-72a7-446d-a7cb-116571fc4cdb/paragraph_type?resourceVersion=id%3A19604\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/call_out_box/2b4d5747-72a7-446d-a7cb-116571fc4cdb/relationships/paragraph_type?resourceVersion=id%3A19604\"}}}}},{\"type\":\"paragraph--process_list\",\"id\":\"4b0acb88-c6ef-4d05-89d7-30df164aa5a4\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list/4b0acb88-c6ef-4d05-89d7-30df164aa5a4?resourceVersion=id%3A19614\"}},\"attributes\":{\"drupal_internal__id\":2731,\"drupal_internal__revision_id\":19614,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-03-24T17:45:48+00:00\",\"parent_id\":\"2736\",\"parent_type\":\"paragraph\",\"parent_field_name\":\"field_specialty_item\",\"behavior_settings\":[],\"default_langcode\":true,\"revision_translation_affected\":true,\"field_process_list_conclusion\":null},\"relationships\":{\"paragraph_type\":{\"data\":{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"8a1fa202-0dc7-4f58-9b3d-7f9c44c9a9c8\",\"meta\":{\"drupal_internal__target_id\":\"process_list\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list/4b0acb88-c6ef-4d05-89d7-30df164aa5a4/paragraph_type?resourceVersion=id%3A19614\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list/4b0acb88-c6ef-4d05-89d7-30df164aa5a4/relationships/paragraph_type?resourceVersion=id%3A19614\"}}},\"field_process_list_item\":{\"data\":[{\"type\":\"paragraph--process_list_item\",\"id\":\"a4baddfe-ce49-4df9-a909-9d6ae8078323\",\"meta\":{\"target_revision_id\":19607,\"drupal_internal__target_id\":2696}},{\"type\":\"paragraph--process_list_item\",\"id\":\"e881744c-12c1-4b30-9885-398fadf2c308\",\"meta\":{\"target_revision_id\":19608,\"drupal_internal__target_id\":2701}},{\"type\":\"paragraph--process_list_item\",\"id\":\"df8d9149-24be-4705-8698-d4da851cbe49\",\"meta\":{\"target_revision_id\":19609,\"drupal_internal__target_id\":2706}},{\"type\":\"paragraph--process_list_item\",\"id\":\"0f611e01-2e5c-4f28-91ad-d61831dfff0f\",\"meta\":{\"target_revision_id\":19610,\"drupal_internal__target_id\":2711}},{\"type\":\"paragraph--process_list_item\",\"id\":\"b8a0c0a0-44a6-4645-bc16-1463f93b6b7f\",\"meta\":{\"target_revision_id\":19611,\"drupal_internal__target_id\":2716}},{\"type\":\"paragraph--process_list_item\",\"id\":\"1a8a9142-5741-4f18-9f28-b006d8ca98ed\",\"meta\":{\"target_revision_id\":19612,\"drupal_internal__target_id\":2721}},{\"type\":\"paragraph--process_list_item\",\"id\":\"364672e0-a233-47a2-9308-75082fefebc2\",\"meta\":{\"target_revision_id\":19613,\"drupal_internal__target_id\":2726}}],\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list/4b0acb88-c6ef-4d05-89d7-30df164aa5a4/field_process_list_item?resourceVersion=id%3A19614\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list/4b0acb88-c6ef-4d05-89d7-30df164aa5a4/relationships/field_process_list_item?resourceVersion=id%3A19614\"}}}}},{\"type\":\"paragraph--process_list_item\",\"id\":\"a4baddfe-ce49-4df9-a909-9d6ae8078323\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/a4baddfe-ce49-4df9-a909-9d6ae8078323?resourceVersion=id%3A19607\"}},\"attributes\":{\"drupal_internal__id\":2696,\"drupal_internal__revision_id\":19607,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-03-24T17:45:48+00:00\",\"parent_id\":\"2731\",\"parent_type\":\"paragraph\",\"parent_field_name\":\"field_process_list_item\",\"behavior_settings\":[],\"default_langcode\":true,\"revision_translation_affected\":true,\"field_list_item_description\":{\"value\":\"\u003cp\u003eAs a mentor, think about what you can offer and how you would like to help other ISSOs. As a mentee, consider specific skills or knowledge you want to gain. Setting goals and desired outcomes from the beginning will ensure a more effective partnership.\u003c/p\u003e\\r\\n\",\"format\":\"main_point_html\",\"processed\":\"\u003cp\u003eAs a mentor, think about what you can offer and how you would like to help other ISSOs. As a mentee, consider specific skills or knowledge you want to gain. Setting goals and desired outcomes from the beginning will ensure a more effective partnership.\u003c/p\u003e\"},\"field_list_item_title\":\"Decide on your goals\"},\"relationships\":{\"paragraph_type\":{\"data\":{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"169b4697-c521-4a95-b21a-aa0d3f051203\",\"meta\":{\"drupal_internal__target_id\":\"process_list_item\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/a4baddfe-ce49-4df9-a909-9d6ae8078323/paragraph_type?resourceVersion=id%3A19607\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/a4baddfe-ce49-4df9-a909-9d6ae8078323/relationships/paragraph_type?resourceVersion=id%3A19607\"}}}}},{\"type\":\"paragraph--process_list_item\",\"id\":\"e881744c-12c1-4b30-9885-398fadf2c308\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/e881744c-12c1-4b30-9885-398fadf2c308?resourceVersion=id%3A19608\"}},\"attributes\":{\"drupal_internal__id\":2701,\"drupal_internal__revision_id\":19608,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-03-24T17:46:10+00:00\",\"parent_id\":\"2731\",\"parent_type\":\"paragraph\",\"parent_field_name\":\"field_process_list_item\",\"behavior_settings\":[],\"default_langcode\":true,\"revision_translation_affected\":true,\"field_list_item_description\":{\"value\":\"\u003cp\u003eAnyone who participates in mentorship must get approval from their manager. Though the time commitment is flexible, it will require some investment and could result in periods of reduced availability for day to day work. As a mentor or mentee, make sure your manager understands and approves of your planned level of participation in the program.\u003c/p\u003e\\r\\n\",\"format\":\"main_point_html\",\"processed\":\"\u003cp\u003eAnyone who participates in mentorship must get approval from their manager. Though the time commitment is flexible, it will require some investment and could result in periods of reduced availability for day to day work. As a mentor or mentee, make sure your manager understands and approves of your planned level of participation in the program.\u003c/p\u003e\"},\"field_list_item_title\":\"Get manager approval\"},\"relationships\":{\"paragraph_type\":{\"data\":{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"169b4697-c521-4a95-b21a-aa0d3f051203\",\"meta\":{\"drupal_internal__target_id\":\"process_list_item\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/e881744c-12c1-4b30-9885-398fadf2c308/paragraph_type?resourceVersion=id%3A19608\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/e881744c-12c1-4b30-9885-398fadf2c308/relationships/paragraph_type?resourceVersion=id%3A19608\"}}}}},{\"type\":\"paragraph--process_list_item\",\"id\":\"df8d9149-24be-4705-8698-d4da851cbe49\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/df8d9149-24be-4705-8698-d4da851cbe49?resourceVersion=id%3A19609\"}},\"attributes\":{\"drupal_internal__id\":2706,\"drupal_internal__revision_id\":19609,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-03-24T17:47:10+00:00\",\"parent_id\":\"2731\",\"parent_type\":\"paragraph\",\"parent_field_name\":\"field_process_list_item\",\"behavior_settings\":[],\"default_langcode\":true,\"revision_translation_affected\":true,\"field_list_item_description\":{\"value\":\"\u003cp\u003eGetting started with ISSO mentorship is easy. Just send an email to \u003ca href=\\\"mailto:ISSO@cms.hhs.gov\\\"\u003eISSO@cms.hhs.gov\u003c/a\u003e and include the word \u003cstrong\u003eMentorship\u003c/strong\u003e in the subject line. Someone will contact you to set up an initial orientation meeting.\u003c/p\u003e\\r\\n\",\"format\":\"main_point_html\",\"processed\":\"\u003cp\u003eGetting started with ISSO mentorship is easy. Just send an email to \u003ca href=\\\"mailto:ISSO@cms.hhs.gov\\\"\u003eISSO@cms.hhs.gov\u003c/a\u003e and include the word \u003cstrong\u003eMentorship\u003c/strong\u003e in the subject line. Someone will contact you to set up an initial orientation meeting.\u003c/p\u003e\"},\"field_list_item_title\":\"Send a request to the ISSO team\"},\"relationships\":{\"paragraph_type\":{\"data\":{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"169b4697-c521-4a95-b21a-aa0d3f051203\",\"meta\":{\"drupal_internal__target_id\":\"process_list_item\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/df8d9149-24be-4705-8698-d4da851cbe49/paragraph_type?resourceVersion=id%3A19609\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/df8d9149-24be-4705-8698-d4da851cbe49/relationships/paragraph_type?resourceVersion=id%3A19609\"}}}}},{\"type\":\"paragraph--process_list_item\",\"id\":\"0f611e01-2e5c-4f28-91ad-d61831dfff0f\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/0f611e01-2e5c-4f28-91ad-d61831dfff0f?resourceVersion=id%3A19610\"}},\"attributes\":{\"drupal_internal__id\":2711,\"drupal_internal__revision_id\":19610,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-03-24T17:47:38+00:00\",\"parent_id\":\"2731\",\"parent_type\":\"paragraph\",\"parent_field_name\":\"field_process_list_item\",\"behavior_settings\":[],\"default_langcode\":true,\"revision_translation_affected\":true,\"field_list_item_description\":{\"value\":\"\u003cp\u003eThe ISSO Support Team meets with a potential mentor or mentee to introduce them to the program and learn about the individuals goals for participation and learning. Allow about an hour for this meeting. It will help you know what to expect, how to get assistance if needed, and how to plan an effective engagement from beginning to end. After orientation, the ISSO Support Team will have the information they need to find an appropriate match (either a mentor or mentee) for you.\u003c/p\u003e\\r\\n\",\"format\":\"main_point_html\",\"processed\":\"\u003cp\u003eThe ISSO Support Team meets with a potential mentor or mentee to introduce them to the program and learn about the individuals goals for participation and learning. Allow about an hour for this meeting. It will help you know what to expect, how to get assistance if needed, and how to plan an effective engagement from beginning to end. After orientation, the ISSO Support Team will have the information they need to find an appropriate match (either a mentor or mentee) for you.\u003c/p\u003e\"},\"field_list_item_title\":\"Complete orientation\"},\"relationships\":{\"paragraph_type\":{\"data\":{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"169b4697-c521-4a95-b21a-aa0d3f051203\",\"meta\":{\"drupal_internal__target_id\":\"process_list_item\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/0f611e01-2e5c-4f28-91ad-d61831dfff0f/paragraph_type?resourceVersion=id%3A19610\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/0f611e01-2e5c-4f28-91ad-d61831dfff0f/relationships/paragraph_type?resourceVersion=id%3A19610\"}}}}},{\"type\":\"paragraph--process_list_item\",\"id\":\"b8a0c0a0-44a6-4645-bc16-1463f93b6b7f\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/b8a0c0a0-44a6-4645-bc16-1463f93b6b7f?resourceVersion=id%3A19611\"}},\"attributes\":{\"drupal_internal__id\":2716,\"drupal_internal__revision_id\":19611,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-03-24T17:48:01+00:00\",\"parent_id\":\"2731\",\"parent_type\":\"paragraph\",\"parent_field_name\":\"field_process_list_item\",\"behavior_settings\":[],\"default_langcode\":true,\"revision_translation_affected\":true,\"field_list_item_description\":{\"value\":\"\u003cp\u003eOnce you are put in touch with your mentorship partner, schedule your first meeting so you can get to know each other. This can be scheduled by either the mentor or mentee. Both should come prepared to discuss goals and desired outcomes for the engagement, along with logistic preferences such as meeting cadence and location. Take the time to make this meeting count! Whether you meet in person or virtually, try to reduce distractions and bring your full focus.\u003c/p\u003e\\r\\n\",\"format\":\"main_point_html\",\"processed\":\"\u003cp\u003eOnce you are put in touch with your mentorship partner, schedule your first meeting so you can get to know each other. This can be scheduled by either the mentor or mentee. Both should come prepared to discuss goals and desired outcomes for the engagement, along with logistic preferences such as meeting cadence and location. Take the time to make this meeting count! Whether you meet in person or virtually, try to reduce distractions and bring your full focus.\u003c/p\u003e\"},\"field_list_item_title\":\"Meet with your mentor / mentee\"},\"relationships\":{\"paragraph_type\":{\"data\":{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"169b4697-c521-4a95-b21a-aa0d3f051203\",\"meta\":{\"drupal_internal__target_id\":\"process_list_item\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/b8a0c0a0-44a6-4645-bc16-1463f93b6b7f/paragraph_type?resourceVersion=id%3A19611\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/b8a0c0a0-44a6-4645-bc16-1463f93b6b7f/relationships/paragraph_type?resourceVersion=id%3A19611\"}}}}},{\"type\":\"paragraph--process_list_item\",\"id\":\"1a8a9142-5741-4f18-9f28-b006d8ca98ed\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/1a8a9142-5741-4f18-9f28-b006d8ca98ed?resourceVersion=id%3A19612\"}},\"attributes\":{\"drupal_internal__id\":2721,\"drupal_internal__revision_id\":19612,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-03-24T17:48:24+00:00\",\"parent_id\":\"2731\",\"parent_type\":\"paragraph\",\"parent_field_name\":\"field_process_list_item\",\"behavior_settings\":[],\"default_langcode\":true,\"revision_translation_affected\":true,\"field_list_item_description\":{\"value\":\"\u003cp\u003eShare your preferred ways of communicating and decide what works best for both of you. This could be virtual meetings, email notes, telephone calls, in-person meetings, or a combination. Make sure to note any times of non-availability (such as flex days). A weekly cadence is encouraged to keep up your momentum, but the arrangement is flexible and can be adjusted as needed. Regardless, you should give your mentorship meetings a high priority and your thoughtful attention.\u003c/p\u003e\\r\\n\",\"format\":\"main_point_html\",\"processed\":\"\u003cp\u003eShare your preferred ways of communicating and decide what works best for both of you. This could be virtual meetings, email notes, telephone calls, in-person meetings, or a combination. Make sure to note any times of non-availability (such as flex days). A weekly cadence is encouraged to keep up your momentum, but the arrangement is flexible and can be adjusted as needed. Regardless, you should give your mentorship meetings a high priority and your thoughtful attention.\u003c/p\u003e\"},\"field_list_item_title\":\"Establish format and frequency\"},\"relationships\":{\"paragraph_type\":{\"data\":{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"169b4697-c521-4a95-b21a-aa0d3f051203\",\"meta\":{\"drupal_internal__target_id\":\"process_list_item\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/1a8a9142-5741-4f18-9f28-b006d8ca98ed/paragraph_type?resourceVersion=id%3A19612\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/1a8a9142-5741-4f18-9f28-b006d8ca98ed/relationships/paragraph_type?resourceVersion=id%3A19612\"}}}}},{\"type\":\"paragraph--process_list_item\",\"id\":\"364672e0-a233-47a2-9308-75082fefebc2\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/364672e0-a233-47a2-9308-75082fefebc2?resourceVersion=id%3A19613\"}},\"attributes\":{\"drupal_internal__id\":2726,\"drupal_internal__revision_id\":19613,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-03-24T17:48:52+00:00\",\"parent_id\":\"2731\",\"parent_type\":\"paragraph\",\"parent_field_name\":\"field_process_list_item\",\"behavior_settings\":[],\"default_langcode\":true,\"revision_translation_affected\":true,\"field_list_item_description\":{\"value\":\"\u003cp\u003eAs you begin sharing and learning together on a regular basis, you may decide to adjust your schedule, methods, or even goals. This is fine, as long as you both feel that the partnership is still beneficial. At the beginning, you should set a time frame for the engagement (based on the desired outcomes), but this is also subject to change if mutually agreed upon. Check in frequently, communicate clearly, and feel free to reach out to the ISSO Support Team if either of you needs assistance along the way!\u003c/p\u003e\\r\\n\",\"format\":\"main_point_html\",\"processed\":\"\u003cp\u003eAs you begin sharing and learning together on a regular basis, you may decide to adjust your schedule, methods, or even goals. This is fine, as long as you both feel that the partnership is still beneficial. At the beginning, you should set a time frame for the engagement (based on the desired outcomes), but this is also subject to change if mutually agreed upon. Check in frequently, communicate clearly, and feel free to reach out to the ISSO Support Team if either of you needs assistance along the way!\u003c/p\u003e\"},\"field_list_item_title\":\"Start your mentorship journey\"},\"relationships\":{\"paragraph_type\":{\"data\":{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"169b4697-c521-4a95-b21a-aa0d3f051203\",\"meta\":{\"drupal_internal__target_id\":\"process_list_item\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/364672e0-a233-47a2-9308-75082fefebc2/paragraph_type?resourceVersion=id%3A19613\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/process_list_item/364672e0-a233-47a2-9308-75082fefebc2/relationships/paragraph_type?resourceVersion=id%3A19613\"}}}}}],\"includedMap\":{\"d185e460-4998-4d2b-85cb-b04f304dfb1b\":\"$1c\",\"3621116d-42ad-4630-8ff7-ec6dda4bc633\":\"$26\",\"e352e203-fe9c-47ba-af75-2c7f8302fca8\":\"$2a\",\"9e907eeb-b0a8-4dd3-8818-37cb1557a8f4\":\"$2e\",\"7a18463d-b0fc-474f-8536-ad7db1b2e5ab\":\"$48\",\"8b8ffea0-3b0b-404d-8442-7f3a4602482d\":\"$62\",\"f9ca6b9e-0b66-4c42-aa2c-2ff997c11894\":\"$7c\",\"1c38d685-2704-4e1f-921d-3b1ed5737b6f\":\"$8f\",\"e1397bac-2738-4de5-9e57-6f09f6751d42\":\"$a2\",\"60a7d525-a81d-4ae7-9349-d7ed4e8588f9\":\"$b5\",\"2b4d5747-72a7-446d-a7cb-116571fc4cdb\":\"$c8\",\"4b0acb88-c6ef-4d05-89d7-30df164aa5a4\":\"$d5\",\"a4baddfe-ce49-4df9-a909-9d6ae8078323\":\"$f4\",\"e881744c-12c1-4b30-9885-398fadf2c308\":\"$101\",\"df8d9149-24be-4705-8698-d4da851cbe49\":\"$10e\",\"0f611e01-2e5c-4f28-91ad-d61831dfff0f\":\"$11b\",\"b8a0c0a0-44a6-4645-bc16-1463f93b6b7f\":\"$128\",\"1a8a9142-5741-4f18-9f28-b006d8ca98ed\":\"$135\",\"364672e0-a233-47a2-9308-75082fefebc2\":\"$142\"}}}]\n"])</script><script>self.__next_f.push([1,"a:[[\"$\",\"meta\",\"0\",{\"name\":\"viewport\",\"content\":\"width=device-width, initial-scale=1\"}],[\"$\",\"meta\",\"1\",{\"charSet\":\"utf-8\"}],[\"$\",\"title\",\"2\",{\"children\":\"ISSO Mentorship Program | CMS Information Security \u0026 Privacy Group\"}],[\"$\",\"meta\",\"3\",{\"name\":\"description\",\"content\":\"ISPG program that pairs CMS Information System Security Officers (ISSOs) with their peers for knowledge sharing and support\"}],[\"$\",\"link\",\"4\",{\"rel\":\"canonical\",\"href\":\"https://security.cms.gov/learn/isso-mentorship-program\"}],[\"$\",\"meta\",\"5\",{\"name\":\"google-site-verification\",\"content\":\"GMZIwBDJgz_o_JYUB2GpJazkrs7P85BaWDsoCjxF32M\"}],[\"$\",\"meta\",\"6\",{\"property\":\"og:title\",\"content\":\"ISSO Mentorship Program | CMS Information Security \u0026 Privacy Group\"}],[\"$\",\"meta\",\"7\",{\"property\":\"og:description\",\"content\":\"ISPG program that pairs CMS Information System Security Officers (ISSOs) with their peers for knowledge sharing and support\"}],[\"$\",\"meta\",\"8\",{\"property\":\"og:url\",\"content\":\"https://security.cms.gov/learn/isso-mentorship-program\"}],[\"$\",\"meta\",\"9\",{\"property\":\"og:image:type\",\"content\":\"image/jpeg\"}],[\"$\",\"meta\",\"10\",{\"property\":\"og:image:width\",\"content\":\"1200\"}],[\"$\",\"meta\",\"11\",{\"property\":\"og:image:height\",\"content\":\"630\"}],[\"$\",\"meta\",\"12\",{\"property\":\"og:image\",\"content\":\"https://security.cms.gov/learn/isso-mentorship-program/opengraph-image.jpg?d21225707c5ed280\"}],[\"$\",\"meta\",\"13\",{\"property\":\"og:type\",\"content\":\"website\"}],[\"$\",\"meta\",\"14\",{\"name\":\"twitter:card\",\"content\":\"summary_large_image\"}],[\"$\",\"meta\",\"15\",{\"name\":\"twitter:title\",\"content\":\"ISSO Mentorship Program | CMS Information Security \u0026 Privacy Group\"}],[\"$\",\"meta\",\"16\",{\"name\":\"twitter:description\",\"content\":\"ISPG program that pairs CMS Information System Security Officers (ISSOs) with their peers for knowledge sharing and support\"}],[\"$\",\"meta\",\"17\",{\"name\":\"twitter:image:type\",\"content\":\"image/jpeg\"}],[\"$\",\"meta\",\"18\",{\"name\":\"twitter:image:width\",\"content\":\"1200\"}],[\"$\",\"meta\",\"19\",{\"name\":\"twitter:image:height\",\"content\":\"630\"}],[\"$\",\"meta\",\"20\",{\"name\":\"twitter:image\",\"content\":\"https://security.cms.gov/learn/isso-mentorship-program/opengraph-image.jpg?d21225707c5ed280\"}],[\"$\",\"link\",\"21\",{\"rel\":\"icon\",\"href\":\"/favicon.ico\",\"type\":\"image/x-icon\",\"sizes\":\"48x48\"}]]\n"])</script><script>self.__next_f.push([1,"4:null\n"])</script></body></html>