Skip to main content (Press Enter).
Sign in
Skip auxiliary navigation (Press Enter).
Contact Us
Terms and Conditions
Skip main navigation (Press Enter).
Toggle navigation
Search Options
Home
Communities
Public Communities
Membership Communities
Training Communities
Chapters
Research Working Groups
My Communities
The Inner Circle
CSA Blog
Directory
Events
Upcoming Events
Participate
Volunteer
Volunteer Opportunities
Community Home
Discussion
The Inner Circle
Community Navigator
View Only
Community Home
Discussion
2.2K
Library
464
Events
3
Members
13.2K
1 to 50 of 1203 threads (2.2K total posts)
Least Recently Updated
Most Recently Updated
Least Replies
Most Replies
Thread Subject A-Z
Thread Subject Z-A
10 per page
50 per page
200 per page
Thread Subject
Replies
Last Post
Status
OMG publishes XaaS Glossary
0
4 hours ago
by
Claude Baudoin
CSA Medical Device Incident Response Playbook
0
17 hours ago
by
Orbert Reavis
FedRAMP Penetration Test Guidance Version 3
0
yesterday
by
Michael Roza
Why the ecosystem of Python is in danger?
6
3 hours ago
by
Chris Herdt
Original post by
Ashwani Paliwal
Hybrid Cloud - Continuous Monitoring Capability
1
yesterday
by
Shamun Mahmud
Original post by
Michael Fasere
CISO Perspectives and Progress in Deploying Zero Trust
0
yesterday
by
Orbert Reavis
Draft NIST IR 8323 Revision 1 Foundational PNT Profile: Applying the Cybersecurity Framework for the Responsible Use of Positioning, Navigation, and Timing (PNT) Services
0
2 days ago
by
Michael Roza
SCA Requirements for Open Source Tools
0
2 days ago
by
Michael Fasere
The Continuous Audit Metrics Catalog: Towards a Machine-Readable Representation
0
2 days ago
by
Orbert Reavis
ISO/IEC 23053:2022 Framework for Artificial Intelligence (AI) Systems Using Machine Learning (ML)
5
3 days ago
by
Alex Sharpe
Original post by
Michael Roza
#TechTopicTuesday
0
3 days ago
by
Orbert Reavis
May the Fourth be with you!
CCSK
Maythe4thBeWithYou
StarWarsDay
6
4 days ago
by
Olivia Rempe
NIST SP 800-219 Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP)
1
4 days ago
by
Emilio Grande
Original post by
Michael Roza
Walmart Amps Up Cloud Capabilities, Reducing Reliance on Tech Giants
0
4 days ago
by
Olivia Rempe
SaaS Governance Best Practices for Cloud Customers
0
4 days ago
by
Orbert Reavis
FedRAMP Plan of Action and Milestones (POA&M) Template
0
4 days ago
by
Michael Roza
CSA Seattle Chapter June meeting - 6pm (PDT) June 30th at Galvanize Seattle
0
7 days ago
by
Shamun Mahmud
CAIQ v4 Released - Changes from v3.1 to v4
0
7 days ago
by
Orbert Reavis
Draft NIST SP 1800-34, Validating the Integrity of Computing Devices
0
7 days ago
by
Michael Roza
NSA: CSI Keeping PowerShell: Security Measures to Use and Embrace
0
8 days ago
by
Michael Roza
CloudCon 2022
0
8 days ago
by
Orbert Reavis
Risk Management with Google
1
9 days ago
by
Shamun Mahmud
Original post by
Orbert Reavis
NIST.IR.8425.ipd A Profile of the IoT Core Baseline for Consumer IoT Products Draft for Comments
0
10 days ago
by
Michael Roza
NIST Discussion Essay titled Ideas for the Future of IoT Cybersecurity at NIST: IoT Risk Identification Complexity
0
10 days ago
by
Michael Roza
#TechTopicTuesday
0
10 days ago
by
Orbert Reavis
ISO/IEC 27400:2022 Cybersecurity - IoT security and privacy - Guidelines
1
11 days ago
by
Shamun Mahmud
Original post by
Michael Roza
SECtember Call for Participation
0
11 days ago
by
Orbert Reavis
IEC 62657-2:2022 Industrial communication networks - Coexistence of wireless systems - Part 2: Coexistence management
0
14 days ago
by
Michael Roza
HPC Cloud Services Onboarding Guide
0
14 days ago
by
Orbert Reavis
Black Hat 2022
0
15 days ago
by
Orbert Reavis
CISA Trusted Internet Connections 3.0 Cloud Use Case June 2022 Version 1.0
0
15 days ago
by
Michael Roza
NSA CTR Network Report Infrastructure Security Guide
0
15 days ago
by
Michael Roza
Blockchain and distributed ledger technologies – Overview of existing DLT systems for identity management
0
16 days ago
by
Michael Roza
Infosecurity Europe
0
16 days ago
by
Orbert Reavis
#TechTopicTuesday
0
17 days ago
by
Orbert Reavis
NIST releases Cybersecurity White Paper 26 Ordered tway Combinations for Testing State-based Systems
0
18 days ago
by
Michael Roza
CxO Trust Summit at SECtember
0
18 days ago
by
Orbert Reavis
NIST IR 8409 Measuring the Common Vulnerability Scoring System Base Score Equation Draft for Comment
2
18 days ago
by
christopher kruse
Original post by
Michael Roza
NIST IR 8286D Using Business Impact Analysis to Inform Risk Prioritization and Response draft for comment
0
21 days ago
by
Michael Roza
NIST Requests Public Comments on FIPS 180-4, Secure Hash Standard (SHS)
0
22 days ago
by
Michael Roza
NSA State-Sponsored Cyber Actors Exploit Network Providers and Devices
0
23 days ago
by
Michael Roza
Top Threats to Cloud Computing 2022
0
24 days ago
by
Olivia Rempe
#TechTopicTuesday
0
24 days ago
by
Orbert Reavis
Seeking Legal Advice
3
24 days ago
by
Alex Sharpe
Original post by
Olivia Rempe
SECtember 2022 Keynote
0
25 days ago
by
Orbert Reavis
ISO/IEC 30169:2022 Internet of Things (IoT) - IoT applications for electronic label system (ELS)
0
27 days ago
by
Michael Roza
5G PPP Beyond 5G/6G KPIs and Target Values
0
27 days ago
by
Michael Roza
NIST's National Cybersecurity Center of Excellence (NCCoE) Volume A of a preliminary draft practice guide "Implementing a Zero Trust Architecture"
0
28 days ago
by
Michael Roza
Healthcare Supply Chain Cybersecurity Risk Management
0
28 days ago
by
Orbert Reavis
CSA CxO Trust Summit at RSAC
1
29 days ago
by
Christopher Jablonski
Original post by
Orbert Reavis
Copyright 2020. All rights reserved.
Powered by Higher Logic