Discussion Posts

  Thread Subject Replies Last Post Community Name Status
Jurisdictions allowing company incorporation online
0 2 hours ago by Confidus
The Inner Circle
NISTIR 8360 Machine Learning for Access Control Policy Verification
0 5 hours ago by Michael
The Inner Circle
Philippe Courtot Leadership Award
0 21 hours ago by Orbert
The Inner Circle
EU AI Standardisation Landscape state of play and link to the EC proposal for an AI regulatory framework
0 yesterday by Michael
The Inner Circle
#TechTopicTuesday 1 yesterday by Claude
Original post by Orbert
The Inner Circle
Hi - Looking forward to contribute
0 2 days ago by Jorge
The Inner Circle
Redefining Data Protection Series - Part 1 of 4
0 2 days ago by Jodi
The Inner Circle
NIST Withdraws three Crypto publications - SP 800-15, SP 800-25 and SP 800-32 related to PKI
0 3 days ago by Michael
The Inner Circle
CASB vs. Web Proxies?
0 3 days ago by Jenna
Certificate of Cloud Security Knowledge (CCSK)
ENISA - Methodology for a Sectoral Cybersecurity Assessment
0 3 days ago by Michael
The Inner Circle
SECtember: Why I'm Going 0 3 days ago by Olivia
The Inner Circle
Threat Modelling with remote participants
8 3 days ago by Shyam
Original post by Rowan
The Inner Circle
A User-First Approach to MFA 0 3 days ago by Orbert
The Inner Circle
You're invited to 4th Annual National Cybersecurity Summit
0 4 days ago by Al
The Inner Circle
ACSP Updates
4 6 days ago by Awad
Original post by Rich
Advanced Cloud Security Practitioner (ACSP)
What is the process to update the CSA security guidance V4 doc?
1 6 days ago by Jenna
Original post by Mark
Certificate of Cloud Security Knowledge (CCSK)
Wide-ranging SEC probe into SolarWinds related incidents sparks fear in Corporate America
0 6 days ago by Mark
The Inner Circle
CSA Federal Summit 0 6 days ago by Orbert
The Inner Circle
NISTIR 8374 Draft The Cybersecurity Framework Profile for Ransomware Risk Management,
3 6 days ago by Michael
The Inner Circle
Foresight is 20/20: How to Use Cyber Threat Intelligence for Proactive SecOps 0 7 days ago by Olivia
The Inner Circle
Is the U.S. repeating 9/11 mistakes in the digital era?
0 8 days ago by Jim
The Inner Circle
The CSA Seattle Chapter is Relaunching 0 8 days ago by Olivia
The Inner Circle
#TechTopicTuesday 1 9 days ago by Simon
Original post by Orbert
The Inner Circle
ISO/IEC TS 20000-11:2021 Information technology - Service management - Part 11: Guidance on the relationship between ISO/IEC 20000-1 and service management frameworks: ITIL®
0 10 days ago by Michael
The Inner Circle
Secure DevOps and Misconfigurations Survey
3 13 days ago by Max
Original post by Orbert
The Inner Circle
How is CSA STAR Different From ISO 27001 and SOC 2? 1 13 days ago by Simon
Original post by Orbert
The Inner Circle
FedRAMP SSP ATTACHMENT 13 - Integrated Inventory Workbook Template
5 13 days ago by Robert
Original post by Michael
The Inner Circle
NIST Seeking Comments Draft Criteria for Labeling Program on Capabilities of IoT Devices
1 14 days ago by Anna
Original post by Michael
The Inner Circle
Collaborate with NIST On Our Latest Applied Cryptography Project
1 14 days ago by Anna
Original post by Michael
The Inner Circle
Prioritizing Cybersecurity Risk for Enterprise Risk Management: Draft NISTIR 8286B Available for Comment
1 14 days ago by Anna
Original post by Michael
The Inner Circle
CSA CxO Trust
0 14 days ago by Orbert
The Inner Circle
In-Person Trainings at SECtember 0 14 days ago by Olivia
Certificate of Cloud Security Knowledge (CCSK)
SSO & Defense-in-Depth?
2 15 days ago by Jenna
Certificate of Cloud Security Knowledge (CCSK)
#TechTopicTuesday 1 15 days ago by Simon
Original post by Orbert
The Inner Circle
NIST Validating the Integrity of Computing Devices: Preliminary Draft of SP 1800-34B Available for Comment
0 16 days ago by Michael
The Inner Circle
So A Cloud Security Expert Walks Into a CISO Role... 0 17 days ago by Orbert
The Inner Circle
ISO/IEC 30147:2021 Information technology - Internet of things - Methodology for trustworthiness of IoT system/service
1 17 days ago by Seshagopalan
Original post by Michael
The Inner Circle
How do you risk assess infrastructure blueprints?
9 18 days ago by Robert
Original post by Rima
The Inner Circle
NIST Technical Series Publications: Proposed Publication Identifier Syntax
0 20 days ago by Michael
The Inner Circle
SECtember 2021: Why I'll Be There
0 20 days ago by Orbert
The Inner Circle
20% off CCSK training and exam 0 21 days ago by Orbert
The Inner Circle
A unified and proven Zero Trust system with BeyondCorp and BeyondProd
0 22 days ago by Mark
The Inner Circle
New: AWS IAM Access Analyzer expands to 50+ services - helps you achieve least privilege by generating fine-grained policies that specify the required actions
0 22 days ago by Mark
The Inner Circle
Microsoft commits to spend $20 billion on cybersecurity over five years
0 22 days ago by Mark
The Inner Circle
Infrastructure Templating?
3 22 days ago by Peter HJ
Original post by Jenna
Certificate of Cloud Security Knowledge (CCSK)
T-Mobile Data Breach and Response
2 22 days ago by Claude
Original post by Olivia
The Inner Circle
NISTIR 8259B: IoT Non-Technical Supporting Capability Core Baseline
0 22 days ago by Michael
The Inner Circle
RSAC Marketplace 0 22 days ago by Orbert
The Inner Circle
NIST SP1800-13, Mobile Application Single Sign-On: Improving Authentication for Public Safety First Responders
0 22 days ago by Michael
The Inner Circle
Simple effective cloud adoption and strategy
4 23 days ago by Claude
Original post by Rys
The Inner Circle