The Inner Circle

 View Only

1 to 50 of 2007 threads (3.6K total posts)
  Thread Subject Replies Last Post Status
CISA Critical Infrastructure Workshops - (1) advanced manufacturing, (2) information and communications technology supply chain resilience, and (3) water availability.
0 21 hours ago by Michael Roza
AppOmni Announces Sponsorship of Cloud Security Alliance (CSA) UK
0 yesterday by Paul Simmonds
GPTs specific to cybersecurity, with focus on strategy and sec solutions including industry trends
0 yesterday by Venkat Doddi
NIST Special Publication (SP) 800-224, Keyed-Hash Message Authentication Code (HMAC): Specification of HMAC and Recommendations for Message Authentication for Comment
0 2 days ago by Michael Roza
CISA Self_Attestation_Common_Form_Instructions
0 2 days ago by Michael Roza
Sam Aiello- Shorter, More Effective Zero Trust Survey
0 6 days ago by Sam Aiello
New member from Hong Kong - who will join the upcoming cloud forum?
2 8 days ago by Anita Tam
SECtember.ai Call for Papers
0 11 days ago by Olivia Rempe
CISA Barriers to Single Sign-On (SSO) Adoption for Small and Medium-Sized Businesses: Identifying Challenges and Opportunities
0 12 days ago by Michael Roza
GRC in 2030 A CISO SURVIVAL GUIDE
0 12 days ago by Olivia Rempe
Open Peer Review
0 12 days ago by Olivia Rempe
Non-Human Identity - Astrix - Sponsored Survey
0 15 days ago by Olivia Rempe
NIST Internal Report (IR) 8505, A Data Protection Approach for Cloud-Native Applications, is now available for public comment.
0 16 days ago by Michael Roza
Transparency for Machine Learning-Enabled Medical Devices: Guiding Principles
0 16 days ago by Michael Roza
NIST Requests Public Comments on SP 800-38B and SP 800-38C and CMAC and CCM Block Cipher Modes of Operation
0 17 days ago by Michael Roza
NIST Requests Public Comments on SP 800-38B and SP 800-38C and CMAC and CCM Block Cipher Modes of Operation
0 17 days ago by Michael Roza
NIST IR 8517 is Available for Comment NIST Internal Report (IR) 8517, Hardware Security Failure Scenarios: Potential Weaknesses in Hardware Design
0 17 days ago by Michael Roza
SECtember.ai
2 18 days ago by Olivia Rempe
July 9 webinar - Zero Trust: Myth busters and the Real Deal
0 18 days ago by Nada MacKinney
"Advancing Zero Trust Maturity Throughout the User Pillar" - NSA Released the Fifth in the Series
0 18 days ago by Alex Sharpe
CAVEaT Chatbot update and feedback
0 19 days ago by Alex Kaluza
Public Peer Review: AuthZ Best Practices for Systems using LLMs
0 19 days ago by Josh Buker
Public Peer Review: Using AI for Offensive Security
0 19 days ago by Josh Buker
CSA Large Language Model (LLM) Threats Taxonomy 0 21 days ago by Olivia Rempe
Upgrade to CCSK v5
2 21 days ago by Olivia Rempe
SECtember.ai Call for Presentations
0 22 days ago by Olivia Rempe
New member self-introduction
0 22 days ago by Samer Saleem
New member - Vinay Aradhya
0 22 days ago by Vinay Mallikarjunaradhya
New membership intro
0 22 days ago by Luke Haag
New member to the group
1 26 days ago by Nate Englund
Original post by Shiva Kumar
CCZT Awarded Cutting-Edge Cybersecurity Training
0 27 days ago by Olivia Rempe
CCSK Plus Lab
1 28 days ago by Judith Bagwell
Original post by Sarbojit Bose
Cloud Controls Matrix (CCM) Implementation Guidelines v2.0: Securing the Cloud with the Shared Security Responsibility Model
0 28 days ago by Olivia Rempe
CSA announces CCM Implementation Guidelines version 2.0 release
0 28 days ago by Lefteris Skoutaris
The Annual SaaS Security Report
0 28 days ago by Olivia Rempe
Additional Contributors needed for the PLA WG mapping activity!!
0 29 days ago by Marina Bregkou
Personal
0 29 days ago by Koushik Kona
New member
0 29 days ago by Kannan Meiappan
NIST  has released Draft NIST Special Publication (SP) 1800-36, Trusted Internet of Things (IoT) Device Network-Layer Onboarding and Lifecycle Management for comment
0 one month ago by Michael Roza
NSA CSI: Advancing Zero Trust Maturity Throughout the Visibility and Analytics Pillar
0 one month ago by Michael Roza
Networking, food and drinks at InfoSec for CSA members
1 one month ago by Troy Leach
Original post by Heather Pearse
I'm New
0 one month ago by Edgar Decess
Rethink the Power of Infosecurity
0 one month ago by Paul Simmonds
ENISA Foresight Cybersecurity Threats for 2030 Update March 2024
0 one month ago by Michael Roza
NSA CSI Advancing Zero Trust Maturity Throughout the Application and Workload Pillar
0 one month ago by Michael Roza
Join us! LLM Trust API Presentation and Discussion - May 23, 8am PT
0 one month ago by Hillary Baron
Call for Volunteers: Blockchain and AI Security Solutions Assessment Project
3 one month ago by Chinaezurum Ndumele
Original post by Hillary Baron
NIST (SP) 800-171r3 (Revision 3), Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations, and SP 800-171Ar3, Assessing Security Requirements for Controlled Unclassified Information.
0 one month ago by Michael Roza
3 NSA CTR: DoD Microelectronics: Field Programmable Gate Array Documents
0 one month ago by Michael Roza
CSA CoC to EU Cloud CoC Mapping (Call for Experts)
0 one month ago by Marina Bregkou