Skip to main content (Press Enter).
Sign in
Skip auxiliary navigation (Press Enter).
Contact Us
Terms and Conditions
Skip main navigation (Press Enter).
Toggle navigation
Search Options
Home
Connect
The Inner Circle
Communities
Directory
Learn
Certificates & Trainings
Cloudbytes Webinars
Blog
Videos
Cloud Security
Zero Trust
Technology Maps
Cloud Security Map
Zero Trust Map
Engage
Volunteer
Opportunities
Events
The Inner Circle
Community Navigator
View Only
Community Home
Discussion
3.6K
Library
741
Events
2
Members
23.4K
1 to 50 of 2007 threads (3.6K total posts)
Least Recently Updated
Most Recently Updated
Least Replies
Most Replies
Thread Subject A-Z
Thread Subject Z-A
10 per page
50 per page
200 per page
Thread Subject
Replies
Last Post
Status
CISA Critical Infrastructure Workshops - (1) advanced manufacturing, (2) information and communications technology supply chain resilience, and (3) water availability.
0
21 hours ago
by
Michael Roza
AppOmni Announces Sponsorship of Cloud Security Alliance (CSA) UK
0
yesterday
by
Paul Simmonds
GPTs specific to cybersecurity, with focus on strategy and sec solutions including industry trends
0
yesterday
by
Venkat Doddi
NIST Special Publication (SP) 800-224, Keyed-Hash Message Authentication Code (HMAC): Specification of HMAC and Recommendations for Message Authentication for Comment
0
2 days ago
by
Michael Roza
CISA Self_Attestation_Common_Form_Instructions
0
2 days ago
by
Michael Roza
Sam Aiello- Shorter, More Effective Zero Trust Survey
0
6 days ago
by
Sam Aiello
New member from Hong Kong - who will join the upcoming cloud forum?
2
8 days ago
by
Anita Tam
SECtember.ai Call for Papers
0
11 days ago
by
Olivia Rempe
CISA Barriers to Single Sign-On (SSO) Adoption for Small and Medium-Sized Businesses: Identifying Challenges and Opportunities
0
12 days ago
by
Michael Roza
GRC in 2030 A CISO SURVIVAL GUIDE
0
12 days ago
by
Olivia Rempe
Open Peer Review
0
12 days ago
by
Olivia Rempe
Non-Human Identity - Astrix - Sponsored Survey
0
15 days ago
by
Olivia Rempe
NIST Internal Report (IR) 8505, A Data Protection Approach for Cloud-Native Applications, is now available for public comment.
0
16 days ago
by
Michael Roza
Transparency for Machine Learning-Enabled Medical Devices: Guiding Principles
0
16 days ago
by
Michael Roza
NIST Requests Public Comments on SP 800-38B and SP 800-38C and CMAC and CCM Block Cipher Modes of Operation
0
17 days ago
by
Michael Roza
NIST Requests Public Comments on SP 800-38B and SP 800-38C and CMAC and CCM Block Cipher Modes of Operation
0
17 days ago
by
Michael Roza
NIST IR 8517 is Available for Comment NIST Internal Report (IR) 8517, Hardware Security Failure Scenarios: Potential Weaknesses in Hardware Design
0
17 days ago
by
Michael Roza
SECtember.ai
2
18 days ago
by
Olivia Rempe
July 9 webinar - Zero Trust: Myth busters and the Real Deal
0
18 days ago
by
Nada MacKinney
"Advancing Zero Trust Maturity Throughout the User Pillar" - NSA Released the Fifth in the Series
0
18 days ago
by
Alex Sharpe
CAVEaT Chatbot update and feedback
0
19 days ago
by
Alex Kaluza
Public Peer Review: AuthZ Best Practices for Systems using LLMs
0
19 days ago
by
Josh Buker
Public Peer Review: Using AI for Offensive Security
0
19 days ago
by
Josh Buker
CSA Large Language Model (LLM) Threats Taxonomy
StayAISafe
0
21 days ago
by
Olivia Rempe
Upgrade to CCSK v5
2
21 days ago
by
Olivia Rempe
SECtember.ai Call for Presentations
0
22 days ago
by
Olivia Rempe
New member self-introduction
0
22 days ago
by
Samer Saleem
New member - Vinay Aradhya
0
22 days ago
by
Vinay Mallikarjunaradhya
New membership intro
0
22 days ago
by
Luke Haag
New member to the group
1
26 days ago
by
Nate Englund
Original post by
Shiva Kumar
CCZT Awarded Cutting-Edge Cybersecurity Training
0
27 days ago
by
Olivia Rempe
CCSK Plus Lab
1
28 days ago
by
Judith Bagwell
Original post by
Sarbojit Bose
Cloud Controls Matrix (CCM) Implementation Guidelines v2.0: Securing the Cloud with the Shared Security Responsibility Model
0
28 days ago
by
Olivia Rempe
CSA announces CCM Implementation Guidelines version 2.0 release
0
28 days ago
by
Lefteris Skoutaris
The Annual SaaS Security Report
0
28 days ago
by
Olivia Rempe
Additional Contributors needed for the PLA WG mapping activity!!
0
29 days ago
by
Marina Bregkou
Personal
0
29 days ago
by
Koushik Kona
New member
0
29 days ago
by
Kannan Meiappan
NIST has released Draft NIST Special Publication (SP) 1800-36, Trusted Internet of Things (IoT) Device Network-Layer Onboarding and Lifecycle Management for comment
0
one month ago
by
Michael Roza
NSA CSI: Advancing Zero Trust Maturity Throughout the Visibility and Analytics Pillar
0
one month ago
by
Michael Roza
Networking, food and drinks at InfoSec for CSA members
1
one month ago
by
Troy Leach
Original post by
Heather Pearse
I'm New
0
one month ago
by
Edgar Decess
Rethink the Power of Infosecurity
0
one month ago
by
Paul Simmonds
ENISA Foresight Cybersecurity Threats for 2030 Update March 2024
0
one month ago
by
Michael Roza
NSA CSI Advancing Zero Trust Maturity Throughout the Application and Workload Pillar
0
one month ago
by
Michael Roza
Join us! LLM Trust API Presentation and Discussion - May 23, 8am PT
0
one month ago
by
Hillary Baron
Call for Volunteers: Blockchain and AI Security Solutions Assessment Project
3
one month ago
by
Chinaezurum Ndumele
Original post by
Hillary Baron
NIST (SP) 800-171r3 (Revision 3), Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations, and SP 800-171Ar3, Assessing Security Requirements for Controlled Unclassified Information.
0
one month ago
by
Michael Roza
3 NSA CTR: DoD Microelectronics: Field Programmable Gate Array Documents
0
one month ago
by
Michael Roza
CSA CoC to EU Cloud CoC Mapping (Call for Experts)
0
one month ago
by
Marina Bregkou
Privacy Notice
|
Terms & Conditions
Copyright 2022. All rights reserved.
Powered by Higher Logic