The Inner Circle

1 to 50 of 467 threads (1K total posts)
  Thread Subject Replies Last Post Status
Coffee with CISOs Invitation: Strengthening Your IAM Program with IGA ft. Garret Grajek
1 8 hours ago by VENKAT RAGHAVAN
Original post by Daniela Applegate
Should I share our Company Policies during a security assessment
1 15 hours ago by Ross Leo
Original post by Greg Collins
Draft: New International Standardization Council Working Group (ISC WG) Charter
0 yesterday by Shamun Mahmud
NIST Security Assessment Automation with OSCAL -- NEWS: OSCAL 1.0.0 Release Candidate 2 (RC2)
0 yesterday by Michael Roza
Forescout JSOF Report NameWreck Breaking and Fixing DNS Implementations 202104
0 2 days ago by Michael Roza
NIST Automation of the Cryptographic Module Validation Program (CMVP): NCCoE Project Description For Comment
0 2 days ago by Michael Roza
ISO/IEC TR 24029-1:2021 Artificial Intelligence (AI) - Assessment of the robustness of neural networks - Part 1: Overview
0 3 days ago by Michael Roza
ENISA - CYBERSECURITY CERTIFICATION MARKET STUDY
0 5 days ago by Michael Roza
rThreat Labs Webinar Invitation: The New Frontier of Breach & Attack Emulation
1 7 days ago by Danilo caio da silva vieira silva
Original post by Daniela Applegate
NSA Selecting a Protective DNS Service - UPDATED
0 7 days ago by Michael Roza
Hyperproof webinar invitation: You've done SOC 2, What's Next? (April 22)
0 8 days ago by Jingcong Zhao
New Member - SaaS Questionnaire
0 8 days ago by Anthony Smith
Compilation of Crypto News published in March 2021
0 12 days ago by Dhananjoy Dey
NIST has completed the review of the second-round candidates in NIST's lightweight cryptography standardization process.
0 16 days ago by Michael Roza
NIST SP1800-27, Securing Property Management Systems.
0 16 days ago by Michael Roza
Draft NISTIR 8310, Cybersecurity Framework Election Infrastructure Profile For Comment
0 18 days ago by Michael Roza
New publication: Top 20 Critical Controls Implementation for Salesforce
1 22 days ago by Ian Sharpe
Original post by Shamun Mahmud
NIST 1800-34a Validating the Integrity of Computing Devices Draft for Comment
0 22 days ago by Michael Roza
Call for Participation - Are You a Thought Leader?
0 23 days ago by Melisa Williams
You're invited! EMEA Summit | April 13 & 14
0 23 days ago by Jaclyn Parton
Draft NISTIR 8360 Machine Learning for Access Control Policy Verification
0 23 days ago by Michael Roza
Take the survey: Annual Life and Times of the Cyber Security Professional
0 24 days ago by Courtney Stiven
Container scanning guidance released for FedRAMP
3 25 days ago by Robert Ficcaglia
Original post by Lorenzo Winfrey
REMINDER: Fugue's CEO Presents on March 24th: A Live Demo of Cloud Misconfiguration Hacks and How to Avoid Them j
0 25 days ago by Leah McLean
NCCOE Trusted Internet of Things (IOT) Device Network-Layer Onboarding and Lifecycle Management Draft
2 28 days ago by Michael Roza
Cloud Security Offensive Security
1 29 days ago by Guillaume Boutisseau
Original post by Sandro Rodrigues
Questions about the release
2 29 days ago by Mike Rothman
Original post by Arjun Sawant
Regulation on electronic identification and trust services
0 one month ago by Michael Roza
ENISA Qualified Trust Service Providers - Conformity Assessment and Recommendations
0 one month ago by Michael Roza
ENISA Security Framework for Trust Service Providers & Security Framework for Qualified Trust Providers
0 one month ago by Michael Roza
Kubernetes Best crash course training recommendation?
3 one month ago by Debra Christofferson
ENISA - EU CYBERSECURITY INITIATIVES IN THE FINANCE SECTOR
1 one month ago by Medina Williams
Original post by Michael Roza
CSA Guest Presentation Titled-"Analyzing the business model of the future – Blockchain Consortiums " on March 11th at 11AM EST/2130 PM IST
0 one month ago by Ashish Mehta
NSA Selecting a Protective DNS Service
4 one month ago by Kurt Seifried
Original post by Michael Roza
Event - Hosted by Fugue | A Live Demo of Cloud Misconfiguration Hacks and How to Avoid Them
0 one month ago by Leah McLean
Zero trust and cloud
12 one month ago by Ivan Djordjevic
Privacy for Security Geeks focus group
32 one month ago by Jim Reavis
ROBOCALLING AND COMMUNICATION ID SPOOFING:
0 one month ago by Michael Roza
ISO/IEC TS 27110:2021 Information technology, cybersecurity and privacy protection - Cybersecurity framework development guidelines
0 one month ago by Michael Roza
Compilation of Crypto News published in February 2021
0 one month ago by Dhananjoy Dey
Issues when replying to posts
0 one month ago by Kevin Stander
@ Debra Christofferson question for you specifically
0 one month ago by AJ Sawant
NIST Project Description Addressing Visibility Challenges with TLS 1.3:
0 one month ago by Michael Roza
We're Hiring! - Membership Engagement Manager
0 one month ago by J.R. Santos
We're Hiring! - Training Channel Manager
0 one month ago by J.R. Santos
Feedback Needed: Idaho National Laboratory and Sandia seek cybersecurity expert feedback
0 one month ago by Jim Reavis
Am I correct about this or not
0 one month ago by AJ Sawant
CSA Security Guidance [version 5] Proposals
20 one month ago by Christopher Hughes
Original post by John Yeoh
NIST Toward a PEC Use-Case Suite Whitepaper
1 one month ago by Shailesh Chirputkar
Original post by Michael Roza
NIST Toward a PEC Use-Case Suite Whitepaper - This time with the paper
0 one month ago by Michael Roza