Discussion Posts

  Thread Subject Replies Last Post Community Name Status
NIST SP 800-63Bsup1 Incorporating Syncable Authenticators Digital Identity Guidelines - Authentication and Lifecycle Management
0 18 hours ago by Michael Roza
Top Threats
NIST SP 800-63Bsup1 Incorporating Syncable Authenticators Digital Identity Guidelines - Authentication and Lifecycle Management
0 18 hours ago by Michael Roza
The Inner Circle
NSA Commercial National Security Algorithm Suite 2.0 FAQ April 2024 Update
0 19 hours ago by Michael Roza
Cloud Key Management
NSA Commercial National Security Algorithm Suite 2.0 FAQ April 2024 Update
0 19 hours ago by Michael Roza
Quantum-safe Security
Meeting Minutes - 23 April 2024
0 yesterday by Hillary Baron
Quantum-safe Security
Working group call has started. Feel free to join!
0 yesterday by Marina Bregkou
Privacy Level Agreement
Looking for the leadership team!
1 yesterday by Akhil Mittal
Original post by Raphael Bottino
North Texas Chapter
CCSK v5 Self-Paced Course Review: Domains 5 and 10
0 2 days ago by Judith Bagwell
Certificate of Cloud Security Knowledge (CCSK)
Kind reminder of tomorrow's working group call!
0 2 days ago by Marina Bregkou
Privacy Level Agreement
CISO Cloud Community a SICUREZZA ICT 2024 | Roma, 8 Maggio
0 2 days ago by Alberto Manfredi
Italy Chapter - Community
QSS Subgroup - Quantum Safe Security Governance meeting on April 13, 2024
3 5 days ago by John Jiang
Quantum-safe Security
Introduction
1 5 days ago by Marina Bregkou
Original post by Salman Younus
The Inner Circle
Introduction
0 6 days ago by Steven Sholtis
Triangle (Raleigh-Durham) Chapter
NIST IR 8425A Recommended Security Requirements for Consumer-Grade Router Products for Comment
0 6 days ago by Michael Roza
Internet of Things
NIST IR 8425A Recommended Security Requirements for Consumer-Grade Router Products for Comment
0 6 days ago by Michael Roza
The Inner Circle
Recap: Workstream 9 - working session, April 17
0 7 days ago by Jason Garbis
Zero Trust architecture, Implementation & Maturity Model
Meeting Recording - Demo the Risk Scoring and Mitigation tools
0 7 days ago by Hillary Baron
Blockchain/ Distributed Ledger
New Threat Intel from Flashpoint and Onapsis
0 7 days ago by Juan Pablo Perez Etchegoyen
Enterprise Resource Planning
Working group call has started. Feel free to join!
0 7 days ago by Marina Bregkou
Cloud Key Management
CCSK v5 Self-Paced Course Review: Domains 1, 2, 3, and 4
0 8 days ago by Judith Bagwell
Certificate of Cloud Security Knowledge (CCSK)
Holistic Cybersecurity and Zero Trust - A New Article
1 8 days ago by Philip Griffiths
Original post by Mark Fishburn
Zero Trust
Meeting Minutes - 16 April 2024
0 8 days ago by Hillary Baron
High Performance Computing
Kind reminder of tomorrow's working group call!
0 8 days ago by Marina Bregkou
Cloud Key Management
Joint Cybersecurity Information Deploying AI Systems Securely
0 9 days ago by Michael Roza
Artificial Intelligence
Joint Cybersecurity Information Deploying AI Systems Securely
0 9 days ago by Michael Roza
The Inner Circle
Meeting Minutes 3 April 2024
0 9 days ago by Marina Bregkou
Cloud Key Management
Top Threats Meeting Minutes 2024-04-11
1 9 days ago by Nathan Weilbacher
Original post by Vic Hargrave
Top Threats
Join our webinar tomorrow: Unleashing Crypto-agility: A Blueprint for Post-Quantum Cryptography
1 11 days ago by John Jiang
Original post by Morning Ellergrace
Quantum-safe Security
NIST IR 8475 A Security Perspective on the Web3 Paradigm Available for Comment
0 12 days ago by Michael Roza
Top Threats
NIST IR 8475 A Security Perspective on the Web3 Paradigm Available for Comment
0 12 days ago by Michael Roza
The Inner Circle
New member
2 13 days ago by Harini Joshi
Delaware Valley (Greater Philadelphia) Chapter
ENISA Cyber Resilience Act Requirements Standards Mapping - Joint Research Centre & ENISA Joint Analysis
3 14 days ago by Troy Leach
Original post by Michael Roza
The Inner Circle
Meeting Minutes - 9 April 2024
1 14 days ago by John Chapman
Original post by Hillary Baron
Quantum-safe Security
NSA Advancing Zero Trust Maturity Throughout the Data Pillar
0 15 days ago by Michael Roza
Zero Trust
NSA Advancing Zero Trust Maturity Throughout the Data Pillar
0 15 days ago by Michael Roza
The Inner Circle
CCM V4 - ZT CISA Maturity Model Architecture Mapping (Call for Experts) 0 15 days ago by Lefteris Skoutaris
Cloud Controls Matrix
CCM WG Activities Update (April/2024) 0 15 days ago by Lefteris Skoutaris
Cloud Controls Matrix
LLM AI Security & Governance Checklist
0 17 days ago by Vic Hargrave
Artificial Intelligence
LLM AI Security & Governance Checklist
0 17 days ago by Vic Hargrave
Top Threats
DHS Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) Reporting Requirements for comment
0 19 days ago by Michael Roza
Industrial Control Systems
DHS Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) Reporting Requirements for comment
0 19 days ago by Michael Roza
The Inner Circle
6G Next G Alliance Report: Management and Orchestration
0 19 days ago by Michael Roza
5G Security
6G Next G Alliance Report: Management and Orchestration
0 19 days ago by Michael Roza
The Inner Circle
Reviewers Wanted: QSS Governance/Security Controls Project
3 19 days ago by John Jiang
Original post by Hillary Baron
Quantum-safe Security
ENISA Cyber Resilience Act Requirements Standards Mapping - Joint Research Centre & ENISA Joint Analysis
0 19 days ago by Michael Roza
Internet of Things
Identity Management Day 0 20 days ago by Ryan Gifford
Identity and Access Management
Identity Management Day
0 20 days ago by Ryan Gifford
The Inner Circle
Meeting Minutes - 4 April 2024
0 20 days ago by Hillary Baron
DevSecOps
CISA Continuous Diagnostics and Mitigation (CDM) Program Architecture CDM Data Model Document Version 4.1.1
0 20 days ago by Michael Roza
Zero Trust: Data
CISA Continuous Diagnostics and Mitigation (CDM) Program Architecture CDM Data Model Document Version 4.1.1
0 20 days ago by Michael Roza
The Inner Circle