The Inner Circle

 View Only

1 to 50 of 1281 threads (2.3K total posts)
  Thread Subject Replies Last Post Status
NIST Requests Public Comments on FIPS 180-4, Secure Hash Standard (SHS)
0 4 hours ago by Michael Roza
Online Personal Cyber Security (updated)
0 6 hours ago by Michael Tayo
SECtember 2022 - here I come!
0 10 hours ago by Peter HJ van Eijk
Too smart to be fooled by a hacker? Think again.
0 10 hours ago by Michael Tayo
CSA and GRCIE Partnership
0 12 hours ago by Olivia Rempe
NIST AI Risk Management Framework Second Draft
0 yesterday by Michael Roza
Organizations not confident they can protect sensitive data in the public cloud
1 yesterday by Robert Ficcaglia
Original post by Olivia Rempe
NIST/NCCoE Mitigating AI/ML Bias in Context Establishing Practices for Testing, Evaluation, Verification, and Validation of AI Systems Draft
0 yesterday by Michael Roza
CSA Corporate Membership
0 yesterday by Olivia Rempe
Level Up Booster 0 yesterday by Orbert Reavis
NIST.SP.800-108r1 Recommendation for Key Derivation Using Pseudorandom Functions
0 2 days ago by Michael Roza
#TechTopicTuesday
0 3 days ago by Olivia Rempe
Overview of Critical Controls for Oracle Cloud Applications
0 4 days ago by Olivia Rempe
IAF Mandatory Document Transition Requirements for ISO /IEC 27001:2022
0 4 days ago by Michael Roza
NIST IR 8214B, Notes on Threshold EdDSA/Schnorr Signatures Open For Comment
0 7 days ago by Michael Roza
CSA Zero Trust Working Group Annual Kickoff
0 7 days ago by Orbert Reavis
New Release - Microsoft CISO Workshop Training
9 8 days ago by Carmen Ramirez Morales
Original post by Johan Olivier
What is the CSA Cloud Controls Matrix and Why Should Everyone on the Cloud Care?
0 8 days ago by Orbert Reavis
Online Personal Cyber Security
0 9 days ago by Michael Tayo
CCM Feedback Form
0 9 days ago by Orbert Reavis
CSA IAM Working Group Annual Kickoff
3 10 days ago by Dwarkesh Dhabalia
Original post by Orbert Reavis
#TechTopicTuesday
0 10 days ago by Orbert Reavis
Publication Peer Review: Recommendations for using a Customer Controlled Key Store
0 11 days ago by Orbert Reavis
Seeking new authors to implement NIST 800-53 controls to Serverless!!!
0 11 days ago by Marina Bregkou
NIST SP 800-215 Guide to a Secure Enterprise Network Landscape
0 14 days ago by Michael Roza
Top Threats to Cloud Computing: Pandemic Eleven
0 14 days ago by Orbert Reavis
Third-Party Vendor Risk Management
0 15 days ago by Orbert Reavis
The Certificate of Cloud Auditing Knowledge (CCAK) Available in Spanish!
0 16 days ago by Orbert Reavis
#TechTopicTuesday
0 17 days ago by Orbert Reavis
ISO/IEC 22989:2022 Information technology - Artificial intelligence - Artificial intelligence concepts and terminology
1 18 days ago by Claude Baudoin
Original post by Michael Roza
CSA ASEAN Summit 2022
0 18 days ago by Orbert Reavis
Best Training for CCSK
5 19 days ago by Guillaume Boutisseau
Original post by Sampath Sundararajan
ENISA THREAT LANDSCAPE FOR RANSOMWARE ATTACKS
0 20 days ago by Michael Roza
SECtember 2022
0 21 days ago by Orbert Reavis
CSPS In-space Servicing, Assembly, and Manufacturing (ISAM)
0 22 days ago by Michael Roza
Healthcare Interoperability: Public Peer Review
0 22 days ago by Orbert Reavis
Trust Services Security Incidents 2021
0 22 days ago by Michael Roza
Upcoming Microsoft Identity and Access Management YouTube series
0 23 days ago by Dwayne Natwick
State of ICS Security in the Age of Cloud
0 23 days ago by Orbert Reavis
NIST SP 800-66r2 ipd Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule: A Cybersecurity Resource Guide Draft
5 23 days ago by Mark White
Original post by Michael Roza
#TechTopicTuesday
0 24 days ago by Orbert Reavis
Critical Controls Implementation for Oracle Fusion Applications
0 25 days ago by Orbert Reavis
NIST Publishes Security Guidance for First Responder Mobile and Wearable Devices | NIST IR 8235
2 28 days ago by Michael Roza
CCAK Online Review Course - Discount Request
1 28 days ago by Mark White
Original post by Orbert Reavis
CCAK Online Review Course - Discount Request
0 28 days ago by Orbert Reavis
ISO/IEC 27036-2:2022 Cybersecurity - Supplier relationships - Part 2: Requirements
0 29 days ago by Michael Roza
Sensitive Data in the Cloud
0 29 days ago by Orbert Reavis
NIST SP 800-171, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. Call for Comments
1 one month ago by Niels E. Anqvist
Original post by Michael Roza
The Journey to Zero Trust starts with Secure Identity
1 one month ago by Paul Simmonds
Original post by Orbert Reavis
Poll: CSA Seattle Chapter August meeting
0 one month ago by Shamun Mahmud