Skip to main content (Press Enter).
Sign in
Skip auxiliary navigation (Press Enter).
Contact Us
Terms and Conditions
Skip main navigation (Press Enter).
Toggle navigation
Search Options
Home
Connect
The Inner Circle
Communities
Directory
Learn
Certificates & Trainings
Cloudbytes Webinars
Blog
Videos
Cloud Security
Zero Trust
Technology Maps
Cloud Security Map
Zero Trust Map
Engage
Volunteer
Opportunities
Events
The Inner Circle
Community Navigator
View Only
Community Home
Discussion
3.6K
Library
751
Events
4
Members
23.8K
1 to 50 of 2042 threads (3.6K total posts)
Least Recently Updated
Most Recently Updated
Least Replies
Most Replies
Thread Subject A-Z
Thread Subject Z-A
10 per page
50 per page
200 per page
Thread Subject
Replies
Last Post
Status
FedRAMP Modernizing the Federal Risk and Authorization Management Program
0
12 hours ago
by
Michael Roza
Learn about AI Security Testing and Validation at SECtember.ai
0
21 hours ago
by
Olivia Rempe
NIST Risk Management Framework (RMF) Small Enterprise Quick Start Guide
0
2 days ago
by
Michael Roza
AI Model Risk Management Framework
0
2 days ago
by
Olivia Rempe
Learn about AI Threats and Vulnerabilities at SECtember.ai
0
3 days ago
by
Olivia Rempe
Artificial Intelligence in Medical Research: Advancements, Applications, and Ethical & Legal Considerations: Internal Peer Review - July 26
1
3 days ago
by
Sarah Shafqat
Original post by
Alex Kaluza
Call for Experts: SaaS Controls Development
1
3 days ago
by
Deepak Antiya
Original post by
Lefteris Skoutaris
NIST SP 800-233 Service Mesh Proxy Models for Cloud-Native Applications Draft Available for Public Comment
0
6 days ago
by
Michael Roza
Webinar on Domain Taxonomies for Cloud Data Governance
0
8 days ago
by
Claude Baudoin
Next Object Management Group meetings
0
8 days ago
by
Claude Baudoin
SaaS Controls Development: Call for Experts
2
8 days ago
by
Stephen Roy
Original post by
Olivia Rempe
Now Available: CCSK v5
1
8 days ago
by
Sheldon Dorney
Original post by
Olivia Rempe
How to earn your CCSK
0
8 days ago
by
Olivia Rempe
Generative AI RFI
0
9 days ago
by
Olivia Rempe
Personal Identity Verification (PIV) Interfaces, Cryptographic Algorithms, and Key Sizes: NIST Revises SP 800-73 and SP 800-78
0
9 days ago
by
Michael Roza
Cross-cloud integrations and the significance of good Identity and Access Management (IAM)
0
9 days ago
by
Alex Sharpe
Introducing the Updated Version of CCSK
0
10 days ago
by
Olivia Rempe
Call for Experts: Upgrade to CCM v4.1
1
10 days ago
by
raj pandey
Original post by
Lefteris Skoutaris
Now Available: Security Guidance for Critical Areas of Focus in Cloud Computing v5
0
10 days ago
by
Olivia Rempe
SECtember.ai - See Yourself in Cyber
0
11 days ago
by
Olivia Rempe
CCSK v5 Pre-Sale
0
12 days ago
by
Olivia Rempe
NSA Advancing Zero Trust Maturity Throughout the Automation and Orchestration Pillar
0
12 days ago
by
Michael Roza
Journal Read: Design of an asterisk-based VoIP system and the implementation of security solution
0
13 days ago
by
Washima Tuleun
Cybersecurity Alert: Key Findings from Our Study on Nigerian Cyber Attacks
0
15 days ago
by
Washima Tuleun
Chapter Ambassadors
2
15 days ago
by
Michael Roza
Original post by
Olivia Rempe
CCSK vs CCSP
0
16 days ago
by
Olivia Rempe
ISACA Journal "What is Resilience and How Does It Promote Digital Trust"
0
16 days ago
by
Alex Sharpe
State of Multi-Cloud Identity 2024 Survey
0
17 days ago
by
Olivia Rempe
CCSK v5 Release Date Changed to July 16th
0
18 days ago
by
Olivia Rempe
CSA UK - Lightning Talk - Tuesday, July 16 @12.30pm - Securing SaaS in the Era of Zero Trust
0
18 days ago
by
Paul Simmonds
CSA Launching New Working Group - Data Privacy Engineering (DPE)
0
20 days ago
by
Josh Buker
Happy 4th of July
0
22 days ago
by
Alex Sharpe
Artificial Intelligence Lectures
0
22 days ago
by
Ronald Martin
Recommendation for Random Bit Generator Constructions: Fourth Public Draft of NIST SP 800-90C Available for Comment
0
23 days ago
by
Michael Roza
Enterprise Authority To Operate (EATO) Controls Framework
0
23 days ago
by
Olivia Rempe
CISA Critical Infrastructure Workshops - (1) advanced manufacturing, (2) information and communications technology supply chain resilience, and (3) water availability.
0
25 days ago
by
Michael Roza
AppOmni Announces Sponsorship of Cloud Security Alliance (CSA) UK
0
26 days ago
by
Paul Simmonds
GPTs specific to cybersecurity, with focus on strategy and sec solutions including industry trends
0
26 days ago
by
Venkat Doddi
NIST Special Publication (SP) 800-224, Keyed-Hash Message Authentication Code (HMAC): Specification of HMAC and Recommendations for Message Authentication for Comment
0
27 days ago
by
Michael Roza
CISA Self_Attestation_Common_Form_Instructions
0
27 days ago
by
Michael Roza
Sam Aiello- Shorter, More Effective Zero Trust Survey
0
one month ago
by
Sam Aiello
New member from Hong Kong - who will join the upcoming cloud forum?
2
one month ago
by
Anita Tam
SECtember.ai Call for Papers
0
one month ago
by
Olivia Rempe
CISA Barriers to Single Sign-On (SSO) Adoption for Small and Medium-Sized Businesses: Identifying Challenges and Opportunities
0
one month ago
by
Michael Roza
GRC in 2030 A CISO SURVIVAL GUIDE
0
one month ago
by
Olivia Rempe
Open Peer Review
0
one month ago
by
Olivia Rempe
Non-Human Identity - Astrix - Sponsored Survey
0
one month ago
by
Olivia Rempe
NIST Internal Report (IR) 8505, A Data Protection Approach for Cloud-Native Applications, is now available for public comment.
0
one month ago
by
Michael Roza
Transparency for Machine Learning-Enabled Medical Devices: Guiding Principles
0
one month ago
by
Michael Roza
NIST Requests Public Comments on SP 800-38B and SP 800-38C and CMAC and CCM Block Cipher Modes of Operation
0
one month ago
by
Michael Roza
Privacy Notice
|
Terms & Conditions
Copyright 2024. All rights reserved.
Powered by Higher Logic