Discussion Posts

  Thread Subject Replies Last Post Community Name Status
21 May 2024 - Meeting Minutes
1 an hour ago by Hillary Baron
Quantum-safe Security
Call for Volunteers: Blockchain and AI Security Solutions Assessment Project
2 2 hours ago by Hillary Baron
The Inner Circle
Working group call has started. Feel free to join!
0 4 hours ago by Marina Bregkou
Privacy Level Agreement
Kind reminder of tomorrow's working group call!
2 yesterday by Marina Bregkou
Privacy Level Agreement
Blockchain and AI Project - Volunteers Wanted!
0 yesterday by Hillary Baron
Blockchain/ Distributed Ledger
Upcoming Presentation on LLM Trust API
0 yesterday by Marina Bregkou
Artificial Intelligence
Introduction - Kathie Miley
0 yesterday by kathie m
Continuous Assurance Metrics
Infosecurity Europe 4-6 June 2024
0 3 days ago by Paul Simmonds
UK Chapter
QSS Governance subgroup meeting May 17th, 2024
0 4 days ago by John Jiang
Quantum-safe Security
CCM WG Calls Agenda - Available here in Circle
0 5 days ago by Lefteris Skoutaris
Cloud Controls Matrix
Working group call has started. Feel free to join!
0 6 days ago by Marina Bregkou
Cloud Key Management
NIST (SP) 800-171r3 (Revision 3), Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations, and SP 800-171Ar3, Assessing Security Requirements for Controlled Unclassified Information.
0 6 days ago by Michael Roza
Top Threats
NIST (SP) 800-171r3 (Revision 3), Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations, and SP 800-171Ar3, Assessing Security Requirements for Controlled Unclassified Information.
0 6 days ago by Michael Roza
The Inner Circle
CCSK v5 Self-Paced Course Review: Domains 6, 7, 8, 9 11, and 12
0 6 days ago by Judith Bagwell
Certificate of Cloud Security Knowledge (CCSK)
Reminder of tomorrow's Key Mgmt working group call.
0 7 days ago by Marina Bregkou
Cloud Key Management
Data Security Working Group Meeting - 5/9/24
0 7 days ago by Alex Kaluza
Data Security
3 NSA CTR: DoD Microelectronics: Field Programmable Gate Array Documents
0 7 days ago by Michael Roza
Top Threats
3 NSA CTR: DoD Microelectronics: Field Programmable Gate Array Documents
0 7 days ago by Michael Roza
The Inner Circle
CSA CoC to EU Cloud CoC Mapping (Call for Experts)
0 8 days ago by Marina Bregkou
The Inner Circle
Meeting Minutes 9 May, 2024
0 8 days ago by Marina Bregkou
Privacy Level Agreement
QSS Governance subgroup meeting
0 10 days ago by John Jiang
Quantum-safe Security
Vormetric Replacement
1 12 days ago by Iain Beveridge
Original post by Linda White
The Inner Circle
Cloud Incidence Response Strategies
0 12 days ago by S Nichols
Cloud Incident Response
Working group call has started. Feel free to join!
0 12 days ago by Marina Bregkou
Privacy Level Agreement
Top Threats Meeting Minutes 2024-05-09
0 12 days ago by Vic Hargrave
Top Threats
v2x security core technology development
0 12 days ago by Jongjean Kang
The Inner Circle
v2x security core technology development
0 12 days ago by Jongjean Kang
Job Postings
CCZT named Global InfoSec Award winner by Cyber Defense Magazine
1 12 days ago by Chris Jablonski
Original post by Olivia Rempe
The Inner Circle
Hello!
0 12 days ago by Isaiah Richards
CAVEaT
Meeting Minutes 23 April 2024+Reminder of Tomnorrow's Call
0 13 days ago by Marina Bregkou
Privacy Level Agreement
Learn and grow with CSA community
4 13 days ago by Manish Kumar Yadav
Artificial Intelligence
NIST Publishes IR 8504, Access Control on NoSQL Databases
0 14 days ago by Michael Roza
Identity and Access Management
NIST Publishes IR 8504, Access Control on NoSQL Databases
0 14 days ago by Michael Roza
The Inner Circle
Greetings from Roland Rodriguez
0 14 days ago by Roland Rodriguez
The Inner Circle
entry level positions?
0 14 days ago by Doug OLeary
Job Postings
CCSK v5 Self-Paced Course Review: Domains 6, 8 and 11
0 14 days ago by Judith Bagwell
Certificate of Cloud Security Knowledge (CCSK)
Newest Research from CSA's AI Working Group
0 15 days ago by Olivia Rempe
The Inner Circle
Learn and grow with CSA community
0 15 days ago by Manish Kumar Yadav
The Inner Circle
Transaction flow Mapping document - Ready for review
1 15 days ago by Rakesh Datta
Original post by Vinotth Ramalingam
Pillar: Network/Environment
Any active WG on Zero Trust
2 15 days ago by Rakesh Datta
Security as a Service
CCSK V5 - Add cross references to relevant CCM domains (Call for Experts)
1 16 days ago by Alexa Don
Original post by Lefteris Skoutaris
Cloud Controls Matrix
New Member Introduction
2 18 days ago by Klyde Whitman
The Inner Circle
CISA FBI Secure by Design Alert Eliminating Directory Traversal Vulnerabilities in Software 202405
0 18 days ago by Michael Roza
Top Threats
CISA FBI Secure by Design Alert Eliminating Directory Traversal Vulnerabilities in Software 202405
0 18 days ago by Michael Roza
The Inner Circle
Culture Eats strategy for breakfast
0 18 days ago by Adrian Jenkinson
Zero Trust Organizational Strategy & Governance
Query : AI certificate from CSA?
3 18 days ago by Md Nasim Akhtar
Artificial Intelligence
Foresight Cybersecurity Threats For 2030 - Update 2024: Extended report
0 18 days ago by Michael Roza
Top Threats
Foresight Cybersecurity Threats For 2030 - Update 2024: Extended report
0 18 days ago by Michael Roza
The Inner Circle
National Security Memorandum on Critical Infrastructure Security and Resilience
0 18 days ago by Michael Roza
Top Threats
National Security Memorandum on Critical Infrastructure Security and Resilience
0 18 days ago by Michael Roza
The Inner Circle