|
CCSK v5 Self-Paced Course Review: Domains 5 and 10
|
0
|
11 hours ago
by
Judith Bagwell
|
Certificate of Cloud Security Knowledge (CCSK)
|
|
|
Kind reminder of tomorrow's working group call!
|
0
|
20 hours ago
by
Marina Bregkou
|
Privacy Level Agreement
|
|
|
CISO Cloud Community a SICUREZZA ICT 2024 | Roma, 8 Maggio
|
0
|
23 hours ago
by
Alberto Manfredi
|
Italy Chapter - Community
|
|
|
QSS Subgroup - Quantum Safe Security Governance meeting on April 13, 2024
|
3
|
3 days ago
by
John Jiang
|
Quantum-safe Security
|
|
|
Introduction
|
1
|
3 days ago
by
Marina Bregkou
Original post by
Salman Younus
|
The Inner Circle
|
|
|
Introduction
|
0
|
4 days ago
by
Steven Sholtis
|
Triangle (Raleigh-Durham) Chapter
|
|
|
NIST IR 8425A Recommended Security Requirements for Consumer-Grade Router Products for Comment
|
0
|
5 days ago
by
Michael Roza
|
Internet of Things
|
|
|
NIST IR 8425A Recommended Security Requirements for Consumer-Grade Router Products for Comment
|
0
|
5 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
Recap: Workstream 9 - working session, April 17
|
0
|
5 days ago
by
Jason Garbis
|
Zero Trust architecture, Implementation & Maturity Model
|
|
|
Meeting Recording - Demo the Risk Scoring and Mitigation tools
|
0
|
5 days ago
by
Hillary Baron
|
Blockchain/ Distributed Ledger
|
|
|
New Threat Intel from Flashpoint and Onapsis
|
0
|
5 days ago
by
Juan Pablo Perez Etchegoyen
|
Enterprise Resource Planning
|
|
|
Working group call has started. Feel free to join!
|
0
|
5 days ago
by
Marina Bregkou
|
Cloud Key Management
|
|
|
CCSK v5 Self-Paced Course Review: Domains 1, 2, 3, and 4
|
0
|
6 days ago
by
Judith Bagwell
|
Certificate of Cloud Security Knowledge (CCSK)
|
|
|
Holistic Cybersecurity and Zero Trust - A New Article
|
1
|
6 days ago
by
Philip Griffiths
Original post by
Mark Fishburn
|
Zero Trust
|
|
|
Meeting Minutes - 16 April 2024
|
0
|
6 days ago
by
Hillary Baron
|
High Performance Computing
|
|
|
Kind reminder of tomorrow's working group call!
|
0
|
6 days ago
by
Marina Bregkou
|
Cloud Key Management
|
|
|
Joint Cybersecurity Information Deploying AI Systems Securely
|
0
|
7 days ago
by
Michael Roza
|
Artificial Intelligence
|
|
|
Joint Cybersecurity Information Deploying AI Systems Securely
|
0
|
7 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
Meeting Minutes 3 April 2024
|
0
|
7 days ago
by
Marina Bregkou
|
Cloud Key Management
|
|
|
Top Threats Meeting Minutes 2024-04-11
|
1
|
7 days ago
by
Nathan Weilbacher
Original post by
Vic Hargrave
|
Top Threats
|
|
|
Join our webinar tomorrow: Unleashing Crypto-agility: A Blueprint for Post-Quantum Cryptography
|
1
|
9 days ago
by
John Jiang
Original post by
Morning Ellergrace
|
Quantum-safe Security
|
|
|
NIST IR 8475 A Security Perspective on the Web3 Paradigm Available for Comment
|
0
|
11 days ago
by
Michael Roza
|
Top Threats
|
|
|
NIST IR 8475 A Security Perspective on the Web3 Paradigm Available for Comment
|
0
|
11 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
New member
|
2
|
11 days ago
by
Harini Joshi
|
Delaware Valley (Greater Philadelphia) Chapter
|
|
|
ENISA Cyber Resilience Act Requirements Standards Mapping - Joint Research Centre & ENISA Joint Analysis
|
3
|
12 days ago
by
Troy Leach
Original post by
Michael Roza
|
The Inner Circle
|
|
|
Meeting Minutes - 9 April 2024
|
1
|
12 days ago
by
John Chapman
Original post by
Hillary Baron
|
Quantum-safe Security
|
|
|
NSA Advancing Zero Trust Maturity Throughout the Data Pillar
|
0
|
13 days ago
by
Michael Roza
|
Zero Trust
|
|
|
NSA Advancing Zero Trust Maturity Throughout the Data Pillar
|
0
|
13 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
CCM V4 - ZT CISA Maturity Model Architecture Mapping (Call for Experts)
|
0
|
13 days ago
by
Lefteris Skoutaris
|
Cloud Controls Matrix
|
|
|
CCM WG Activities Update (April/2024)
|
0
|
13 days ago
by
Lefteris Skoutaris
|
Cloud Controls Matrix
|
|
|
LLM AI Security & Governance Checklist
|
0
|
15 days ago
by
Vic Hargrave
|
Artificial Intelligence
|
|
|
LLM AI Security & Governance Checklist
|
0
|
15 days ago
by
Vic Hargrave
|
Top Threats
|
|
|
DHS Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) Reporting Requirements for comment
|
0
|
17 days ago
by
Michael Roza
|
Industrial Control Systems
|
|
|
DHS Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) Reporting Requirements for comment
|
0
|
17 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
6G Next G Alliance Report: Management and Orchestration
|
0
|
17 days ago
by
Michael Roza
|
5G Security
|
|
|
6G Next G Alliance Report: Management and Orchestration
|
0
|
17 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
Reviewers Wanted: QSS Governance/Security Controls Project
|
3
|
17 days ago
by
John Jiang
Original post by
Hillary Baron
|
Quantum-safe Security
|
|
|
ENISA Cyber Resilience Act Requirements Standards Mapping - Joint Research Centre & ENISA Joint Analysis
|
0
|
17 days ago
by
Michael Roza
|
Internet of Things
|
|
|
Identity Management Day
|
0
|
18 days ago
by
Ryan Gifford
|
Identity and Access Management
|
|
|
Identity Management Day
|
0
|
18 days ago
by
Ryan Gifford
|
The Inner Circle
|
|
|
Meeting Minutes - 4 April 2024
|
0
|
18 days ago
by
Hillary Baron
|
DevSecOps
|
|
|
CISA Continuous Diagnostics and Mitigation (CDM) Program Architecture CDM Data Model Document Version 4.1.1
|
0
|
18 days ago
by
Michael Roza
|
Zero Trust: Data
|
|
|
CISA Continuous Diagnostics and Mitigation (CDM) Program Architecture CDM Data Model Document Version 4.1.1
|
0
|
18 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
CSWP 33, Product Development Cybersecurity Handbook: Concepts and Considerations for IoT Product Manufacturers for comment
|
0
|
19 days ago
by
Michael Roza
|
Internet of Things
|
|
|
CSWP 33, Product Development Cybersecurity Handbook: Concepts and Considerations for IoT Product Manufacturers for comment
|
0
|
19 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
Data Security Working Group Meeting - 3/28/24
|
0
|
19 days ago
by
Alex Kaluza
|
Data Security
|
|
|
NIST SP 800-61r3 Rev 3, Incident Response Recommendations and Considerations for Cybersecurity Risk Management: A CSF 2.0 Community Profile, for comment.
|
0
|
19 days ago
by
Michael Roza
|
Cloud Incident Response
|
|
|
NIST SP 800-61r3 Rev 3, Incident Response Recommendations and Considerations for Cybersecurity Risk Management: A CSF 2.0 Community Profile, for comment.
|
0
|
19 days ago
by
Michael Roza
|
Top Threats
|
|
|
Minutes from 27th of March and Remindr of tomorrow's call.
|
0
|
20 days ago
by
Marina Bregkou
|
Cloud Key Management
|
|
|
Questions after completion of the CSA STAR Auditor course
|
1
|
21 days ago
by
JOHN DIMARIA
Original post by
Paul Chavez
|
The Inner Circle
|
|