Discussion Posts

  Thread Subject Replies Last Post Community Name Status
You're invited! WaPo reporter Joseph Menn VIP Meet & Greet in Santa Clara, CA
0 37 minutes ago by Jordan McMahon
The Inner Circle
Responsible? AI
8 38 minutes ago by Eren Black
Original post by Saurav Bhattacharya
The Inner Circle
New learning cohort starting soon - CCAK14
1 3 hours ago by Peter HJ van Eijk
Certificate of Cloud Auditing Knowledge (CCAK)
Advanced Phishing Tactics and How to Combat Them
0 17 hours ago by Olivia Rempe
The Inner Circle
DoD Cybersecurity Maturity Model Certification (CMMC) Program
0 22 hours ago by Michael Roza
Top Threats
DoD Cybersecurity Maturity Model Certification (CMMC) Program
0 22 hours ago by Michael Roza
The Inner Circle
Phishing Methods: Clever Tricks Up a Phisher’s Sleeve
0 22 hours ago by Olivia Rempe
The Inner Circle
CSA Global AI Symposium - The Transformative Impact of AI on Security and Security on AI
0 yesterday by Olivia Rempe
The Inner Circle
Cyber Resilience Awareness Day and Virtual Summit
0 yesterday by Alex Sharpe
The Inner Circle
🎉 Secure your (virtual) seat at the ultimate data security event of the year
0 2 days ago by Shalonda Willis
The Inner Circle
Tips for Enhancing MFA Security
0 3 days ago by Olivia Rempe
The Inner Circle
Reflections on NIST Symposium in September 2024, Part 1
0 3 days ago by Olivia Rempe
The Inner Circle
The Power of MFA: Safeguard Your Cloud Accounts
0 3 days ago by Olivia Rempe
The Inner Circle
Data Security Working Group Meeting - 10/10/24 0 4 days ago by Alex Kaluza
Data Security
MFA as a Cornerstone of Zero Trust
0 4 days ago by Olivia Rempe
The Inner Circle
Meeting Minutes - 10 Oct 2024
0 4 days ago by Hillary Baron
Internet of Things
AI Legal Risks Could Increase Due to Loper Decision
0 4 days ago by Olivia Rempe
The Inner Circle
Minutes from the OCF WG Meeting Held Thursday October 10, 2024
0 4 days ago by JOHN DIMARIA
International Standardization Council
Joint Advisory CSA: Update on SVR Cyber Operations and Vulnerability Exploitation
0 4 days ago by Michael Roza
Top Threats
Joint Advisory CSA: Update on SVR Cyber Operations and Vulnerability Exploitation
0 4 days ago by Michael Roza
The Inner Circle
2024-10-09 DPE Meeting Minutes
0 4 days ago by Josh Buker
Data Privacy Engineering
2024-10-10 Model Cards and Data Sheets Meeting Minutes
0 4 days ago by Josh Buker
AI Technology & Risk
Top Threats Meeting Minutes 2024-10-10
0 4 days ago by Vic Hargrave
Top Threats
CSA Global AI Symposium - Anticipating Risks and Controls for the Next Stages in AI Evolution
0 4 days ago by Olivia Rempe
The Inner Circle
Turn on MFA for Strong Cloud Security
0 4 days ago by Olivia Rempe
The Inner Circle
Nobel Prize in physics awarded to 2 scientists for discoveries in machine learning
0 5 days ago by Olivia Rempe
The Inner Circle
ENISA Cryptographic Products and Services Market Analysis
0 5 days ago by Michael Roza
Cloud Key Management
ENISA Cryptographic Products and Services Market Analysis
0 5 days ago by Michael Roza
The Inner Circle
CAIQ Lite submissions now available on Registry
0 5 days ago by Olivia Rempe
The Inner Circle
Understanding Context-Aware MFA
0 5 days ago by Olivia Rempe
The Inner Circle
Key Mgmt Meeting Minutes, 2nd of October 2024
0 5 days ago by Marina Bregkou
Cloud Key Management
2024-10-09 AI Tech & Risk Meeting Minutes
0 5 days ago by Josh Buker
AI Technology & Risk
🚨NEXT WEEK: Join The [Streaming] CISO Summit
0 5 days ago by Shalonda Willis
The Inner Circle
Bolstering the Mission of Cybersecurity with CEO Avani Desai
0 5 days ago by Olivia Rempe
The Inner Circle
New Member Introduction
0 5 days ago by Thomas Comeau
SaaS Governance
Zero Trust Architecture (ZTA) in CI/CD Pipelines
2 5 days ago by Philip Griffiths
Original post by Rahul Kalva
The Inner Circle
SQL Server Security Model
1 5 days ago by Michael Roza
Original post by Rahul Kalva
The Inner Circle
AI-Driven Security Automation for DevOps
1 5 days ago by Michael Roza
Original post by Rahul Kalva
The Inner Circle
Docker Security Principles
1 5 days ago by Michael Roza
Original post by Rahul Kalva
The Inner Circle
Demystifying CI vs. CD
1 5 days ago by Michael Roza
Original post by Rahul Kalva
The Inner Circle
Implementing MFA with CSA's Security Guidance
0 5 days ago by Olivia Rempe
The Inner Circle
Chicago Chapter Meeting October 23rd
0 6 days ago by Annabelle Lohrenz
Chicago Chapter
Meeting Minutes - 8 Oct 2024
0 6 days ago by Hillary Baron
Quantum-safe Security
What is Phishing-Resistant MFA?
0 6 days ago by Olivia Rempe
The Inner Circle
RSVP NOW: The [Streaming] Summit: How to Manage AI Risk in the Hybrid Cloud
0 6 days ago by Shalonda Willis
The Inner Circle
2024-10-08 Vuln Data Meeting Minutes
0 6 days ago by Josh Buker
Vulnerability Data
CCSK Practice Question
0 6 days ago by Olivia Rempe
Certificate of Cloud Security Knowledge (CCSK)
CCSK Practice Question
0 6 days ago by Olivia Rempe
The Inner Circle
PLA Working group call has started. Feel free to join!
0 6 days ago by Marina Bregkou
Privacy Level Agreement
What is MFA?
0 6 days ago by Olivia Rempe
The Inner Circle