|
NIST SP 800-63Bsup1 Incorporating Syncable Authenticators Digital Identity Guidelines - Authentication and Lifecycle Management
|
0
|
18 hours ago
by
Michael Roza
|
Top Threats
|
|
|
NIST SP 800-63Bsup1 Incorporating Syncable Authenticators Digital Identity Guidelines - Authentication and Lifecycle Management
|
0
|
18 hours ago
by
Michael Roza
|
The Inner Circle
|
|
|
NSA Commercial National Security Algorithm Suite 2.0 FAQ April 2024 Update
|
0
|
19 hours ago
by
Michael Roza
|
Cloud Key Management
|
|
|
NSA Commercial National Security Algorithm Suite 2.0 FAQ April 2024 Update
|
0
|
19 hours ago
by
Michael Roza
|
Quantum-safe Security
|
|
|
Meeting Minutes - 23 April 2024
|
0
|
yesterday
by
Hillary Baron
|
Quantum-safe Security
|
|
|
Working group call has started. Feel free to join!
|
0
|
yesterday
by
Marina Bregkou
|
Privacy Level Agreement
|
|
|
Looking for the leadership team!
|
1
|
yesterday
by
Akhil Mittal
Original post by
Raphael Bottino
|
North Texas Chapter
|
|
|
CCSK v5 Self-Paced Course Review: Domains 5 and 10
|
0
|
2 days ago
by
Judith Bagwell
|
Certificate of Cloud Security Knowledge (CCSK)
|
|
|
Kind reminder of tomorrow's working group call!
|
0
|
2 days ago
by
Marina Bregkou
|
Privacy Level Agreement
|
|
|
CISO Cloud Community a SICUREZZA ICT 2024 | Roma, 8 Maggio
|
0
|
2 days ago
by
Alberto Manfredi
|
Italy Chapter - Community
|
|
|
QSS Subgroup - Quantum Safe Security Governance meeting on April 13, 2024
|
3
|
5 days ago
by
John Jiang
|
Quantum-safe Security
|
|
|
Introduction
|
1
|
5 days ago
by
Marina Bregkou
Original post by
Salman Younus
|
The Inner Circle
|
|
|
Introduction
|
0
|
6 days ago
by
Steven Sholtis
|
Triangle (Raleigh-Durham) Chapter
|
|
|
NIST IR 8425A Recommended Security Requirements for Consumer-Grade Router Products for Comment
|
0
|
6 days ago
by
Michael Roza
|
Internet of Things
|
|
|
NIST IR 8425A Recommended Security Requirements for Consumer-Grade Router Products for Comment
|
0
|
6 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
Recap: Workstream 9 - working session, April 17
|
0
|
7 days ago
by
Jason Garbis
|
Zero Trust architecture, Implementation & Maturity Model
|
|
|
Meeting Recording - Demo the Risk Scoring and Mitigation tools
|
0
|
7 days ago
by
Hillary Baron
|
Blockchain/ Distributed Ledger
|
|
|
New Threat Intel from Flashpoint and Onapsis
|
0
|
7 days ago
by
Juan Pablo Perez Etchegoyen
|
Enterprise Resource Planning
|
|
|
Working group call has started. Feel free to join!
|
0
|
7 days ago
by
Marina Bregkou
|
Cloud Key Management
|
|
|
CCSK v5 Self-Paced Course Review: Domains 1, 2, 3, and 4
|
0
|
8 days ago
by
Judith Bagwell
|
Certificate of Cloud Security Knowledge (CCSK)
|
|
|
Holistic Cybersecurity and Zero Trust - A New Article
|
1
|
8 days ago
by
Philip Griffiths
Original post by
Mark Fishburn
|
Zero Trust
|
|
|
Meeting Minutes - 16 April 2024
|
0
|
8 days ago
by
Hillary Baron
|
High Performance Computing
|
|
|
Kind reminder of tomorrow's working group call!
|
0
|
8 days ago
by
Marina Bregkou
|
Cloud Key Management
|
|
|
Joint Cybersecurity Information Deploying AI Systems Securely
|
0
|
9 days ago
by
Michael Roza
|
Artificial Intelligence
|
|
|
Joint Cybersecurity Information Deploying AI Systems Securely
|
0
|
9 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
Meeting Minutes 3 April 2024
|
0
|
9 days ago
by
Marina Bregkou
|
Cloud Key Management
|
|
|
Top Threats Meeting Minutes 2024-04-11
|
1
|
9 days ago
by
Nathan Weilbacher
Original post by
Vic Hargrave
|
Top Threats
|
|
|
Join our webinar tomorrow: Unleashing Crypto-agility: A Blueprint for Post-Quantum Cryptography
|
1
|
11 days ago
by
John Jiang
Original post by
Morning Ellergrace
|
Quantum-safe Security
|
|
|
NIST IR 8475 A Security Perspective on the Web3 Paradigm Available for Comment
|
0
|
12 days ago
by
Michael Roza
|
Top Threats
|
|
|
NIST IR 8475 A Security Perspective on the Web3 Paradigm Available for Comment
|
0
|
12 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
New member
|
2
|
13 days ago
by
Harini Joshi
|
Delaware Valley (Greater Philadelphia) Chapter
|
|
|
ENISA Cyber Resilience Act Requirements Standards Mapping - Joint Research Centre & ENISA Joint Analysis
|
3
|
14 days ago
by
Troy Leach
Original post by
Michael Roza
|
The Inner Circle
|
|
|
Meeting Minutes - 9 April 2024
|
1
|
14 days ago
by
John Chapman
Original post by
Hillary Baron
|
Quantum-safe Security
|
|
|
NSA Advancing Zero Trust Maturity Throughout the Data Pillar
|
0
|
15 days ago
by
Michael Roza
|
Zero Trust
|
|
|
NSA Advancing Zero Trust Maturity Throughout the Data Pillar
|
0
|
15 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
CCM V4 - ZT CISA Maturity Model Architecture Mapping (Call for Experts)
|
0
|
15 days ago
by
Lefteris Skoutaris
|
Cloud Controls Matrix
|
|
|
CCM WG Activities Update (April/2024)
|
0
|
15 days ago
by
Lefteris Skoutaris
|
Cloud Controls Matrix
|
|
|
LLM AI Security & Governance Checklist
|
0
|
17 days ago
by
Vic Hargrave
|
Artificial Intelligence
|
|
|
LLM AI Security & Governance Checklist
|
0
|
17 days ago
by
Vic Hargrave
|
Top Threats
|
|
|
DHS Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) Reporting Requirements for comment
|
0
|
19 days ago
by
Michael Roza
|
Industrial Control Systems
|
|
|
DHS Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) Reporting Requirements for comment
|
0
|
19 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
6G Next G Alliance Report: Management and Orchestration
|
0
|
19 days ago
by
Michael Roza
|
5G Security
|
|
|
6G Next G Alliance Report: Management and Orchestration
|
0
|
19 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
Reviewers Wanted: QSS Governance/Security Controls Project
|
3
|
19 days ago
by
John Jiang
Original post by
Hillary Baron
|
Quantum-safe Security
|
|
|
ENISA Cyber Resilience Act Requirements Standards Mapping - Joint Research Centre & ENISA Joint Analysis
|
0
|
19 days ago
by
Michael Roza
|
Internet of Things
|
|
|
Identity Management Day
|
0
|
20 days ago
by
Ryan Gifford
|
Identity and Access Management
|
|
|
Identity Management Day
|
0
|
20 days ago
by
Ryan Gifford
|
The Inner Circle
|
|
|
Meeting Minutes - 4 April 2024
|
0
|
20 days ago
by
Hillary Baron
|
DevSecOps
|
|
|
CISA Continuous Diagnostics and Mitigation (CDM) Program Architecture CDM Data Model Document Version 4.1.1
|
0
|
20 days ago
by
Michael Roza
|
Zero Trust: Data
|
|
|
CISA Continuous Diagnostics and Mitigation (CDM) Program Architecture CDM Data Model Document Version 4.1.1
|
0
|
20 days ago
by
Michael Roza
|
The Inner Circle
|
|