Discussion Posts

  Thread Subject Replies Last Post Community Name Status
CCSK v5 Self-Paced Course Review: Domains 5 and 10
0 11 hours ago by Judith Bagwell
Certificate of Cloud Security Knowledge (CCSK)
Kind reminder of tomorrow's working group call!
0 20 hours ago by Marina Bregkou
Privacy Level Agreement
CISO Cloud Community a SICUREZZA ICT 2024 | Roma, 8 Maggio
0 23 hours ago by Alberto Manfredi
Italy Chapter - Community
QSS Subgroup - Quantum Safe Security Governance meeting on April 13, 2024
3 3 days ago by John Jiang
Quantum-safe Security
Introduction
1 3 days ago by Marina Bregkou
Original post by Salman Younus
The Inner Circle
Introduction
0 4 days ago by Steven Sholtis
Triangle (Raleigh-Durham) Chapter
NIST IR 8425A Recommended Security Requirements for Consumer-Grade Router Products for Comment
0 5 days ago by Michael Roza
Internet of Things
NIST IR 8425A Recommended Security Requirements for Consumer-Grade Router Products for Comment
0 5 days ago by Michael Roza
The Inner Circle
Recap: Workstream 9 - working session, April 17
0 5 days ago by Jason Garbis
Zero Trust architecture, Implementation & Maturity Model
Meeting Recording - Demo the Risk Scoring and Mitigation tools
0 5 days ago by Hillary Baron
Blockchain/ Distributed Ledger
New Threat Intel from Flashpoint and Onapsis
0 5 days ago by Juan Pablo Perez Etchegoyen
Enterprise Resource Planning
Working group call has started. Feel free to join!
0 5 days ago by Marina Bregkou
Cloud Key Management
CCSK v5 Self-Paced Course Review: Domains 1, 2, 3, and 4
0 6 days ago by Judith Bagwell
Certificate of Cloud Security Knowledge (CCSK)
Holistic Cybersecurity and Zero Trust - A New Article
1 6 days ago by Philip Griffiths
Original post by Mark Fishburn
Zero Trust
Meeting Minutes - 16 April 2024
0 6 days ago by Hillary Baron
High Performance Computing
Kind reminder of tomorrow's working group call!
0 6 days ago by Marina Bregkou
Cloud Key Management
Joint Cybersecurity Information Deploying AI Systems Securely
0 7 days ago by Michael Roza
Artificial Intelligence
Joint Cybersecurity Information Deploying AI Systems Securely
0 7 days ago by Michael Roza
The Inner Circle
Meeting Minutes 3 April 2024
0 7 days ago by Marina Bregkou
Cloud Key Management
Top Threats Meeting Minutes 2024-04-11
1 7 days ago by Nathan Weilbacher
Original post by Vic Hargrave
Top Threats
Join our webinar tomorrow: Unleashing Crypto-agility: A Blueprint for Post-Quantum Cryptography
1 9 days ago by John Jiang
Original post by Morning Ellergrace
Quantum-safe Security
NIST IR 8475 A Security Perspective on the Web3 Paradigm Available for Comment
0 11 days ago by Michael Roza
Top Threats
NIST IR 8475 A Security Perspective on the Web3 Paradigm Available for Comment
0 11 days ago by Michael Roza
The Inner Circle
New member
2 11 days ago by Harini Joshi
Delaware Valley (Greater Philadelphia) Chapter
ENISA Cyber Resilience Act Requirements Standards Mapping - Joint Research Centre & ENISA Joint Analysis
3 12 days ago by Troy Leach
Original post by Michael Roza
The Inner Circle
Meeting Minutes - 9 April 2024
1 12 days ago by John Chapman
Original post by Hillary Baron
Quantum-safe Security
NSA Advancing Zero Trust Maturity Throughout the Data Pillar
0 13 days ago by Michael Roza
Zero Trust
NSA Advancing Zero Trust Maturity Throughout the Data Pillar
0 13 days ago by Michael Roza
The Inner Circle
CCM V4 - ZT CISA Maturity Model Architecture Mapping (Call for Experts) 0 13 days ago by Lefteris Skoutaris
Cloud Controls Matrix
CCM WG Activities Update (April/2024) 0 13 days ago by Lefteris Skoutaris
Cloud Controls Matrix
LLM AI Security & Governance Checklist
0 15 days ago by Vic Hargrave
Artificial Intelligence
LLM AI Security & Governance Checklist
0 15 days ago by Vic Hargrave
Top Threats
DHS Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) Reporting Requirements for comment
0 17 days ago by Michael Roza
Industrial Control Systems
DHS Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) Reporting Requirements for comment
0 17 days ago by Michael Roza
The Inner Circle
6G Next G Alliance Report: Management and Orchestration
0 17 days ago by Michael Roza
5G Security
6G Next G Alliance Report: Management and Orchestration
0 17 days ago by Michael Roza
The Inner Circle
Reviewers Wanted: QSS Governance/Security Controls Project
3 17 days ago by John Jiang
Original post by Hillary Baron
Quantum-safe Security
ENISA Cyber Resilience Act Requirements Standards Mapping - Joint Research Centre & ENISA Joint Analysis
0 17 days ago by Michael Roza
Internet of Things
Identity Management Day 0 18 days ago by Ryan Gifford
Identity and Access Management
Identity Management Day
0 18 days ago by Ryan Gifford
The Inner Circle
Meeting Minutes - 4 April 2024
0 18 days ago by Hillary Baron
DevSecOps
CISA Continuous Diagnostics and Mitigation (CDM) Program Architecture CDM Data Model Document Version 4.1.1
0 18 days ago by Michael Roza
Zero Trust: Data
CISA Continuous Diagnostics and Mitigation (CDM) Program Architecture CDM Data Model Document Version 4.1.1
0 18 days ago by Michael Roza
The Inner Circle
CSWP 33, Product Development Cybersecurity Handbook: Concepts and Considerations for IoT Product Manufacturers for comment
0 19 days ago by Michael Roza
Internet of Things
CSWP 33, Product Development Cybersecurity Handbook: Concepts and Considerations for IoT Product Manufacturers for comment
0 19 days ago by Michael Roza
The Inner Circle
Data Security Working Group Meeting - 3/28/24
0 19 days ago by Alex Kaluza
Data Security
NIST SP 800-61r3 Rev 3, Incident Response Recommendations and Considerations for Cybersecurity Risk Management: A CSF 2.0 Community Profile, for comment.
0 19 days ago by Michael Roza
Cloud Incident Response
NIST SP 800-61r3 Rev 3, Incident Response Recommendations and Considerations for Cybersecurity Risk Management: A CSF 2.0 Community Profile, for comment.
0 19 days ago by Michael Roza
Top Threats
Minutes from 27th of March and Remindr of tomorrow's call.
0 20 days ago by Marina Bregkou
Cloud Key Management
Questions after completion of the CSA STAR Auditor course
1 21 days ago by JOHN DIMARIA
Original post by Paul Chavez
The Inner Circle