The Inner Circle

1 to 50 of 489 threads (1K total posts)
  Thread Subject Replies Last Post Status
BakerHostetler (Law Firm) 2021 Data Security Incident Response Report – Disruption and Transformation A MUST READ
0 17 hours ago by Michael Roza
May 6, 2021 - Microsoft is Answering Europe's Call: Storing and Processing EU Data in the EU
0 18 hours ago by Alberto Manfredi
OneTrust acquisition of Shared Assessments
0 yesterday by Mosi Platt
NIST SP 1800-30 Draft Securing Telehealth Remote Patient Monitoring Ecosystem
0 yesterday by Michael Roza
ENISA Recommendations for the Security of Connected and Automated Mobility
0 yesterday by Michael Roza
Free Shujinko Solution for SOC 2 on Website
0 2 days ago by Brett Goodwin
CCM/CAIQ Clarification of Questions
1 3 days ago by Peter HJ van Eijk
Original post by Dave Naples
NISTIR 8366 Guidance for NIST Staff on Using Inclusive Language in Documentary Standards
0 3 days ago by Michael Roza
EU AI Proposed Regulation
0 5 days ago by Michael Roza
Compilation of Crypto News published in April 2021
0 6 days ago by Dhananjoy Dey
NIST SP 800-161, Revision 1 Comments Sought on Updates to Cyber Supply Chain Risk Management Practices for Systems and Organizations
0 7 days ago by Michael Roza
NSA Stop Malicious Cyber Activity Against Connected Operational Technology
0 7 days ago by Michael Roza
Implementing the HIPAA Security Rule: Call for Comments on SP 800-66, Revision 1
0 8 days ago by Michael Roza
Join our Event Content Review Committee
0 8 days ago by Jaclyn Parton
CSA CISO Summit at RSAC 2021 - Register Today!
0 9 days ago by Melisa Williams
Draft NIST Special Publication 800-172A Assessing Enhanced Security Requirements for Controlled Unclassified Information
0 10 days ago by Michael Roza
Coffee with CISOs Invitation: Building Resilience in SOC Teams ft. Tia Hopkins
0 10 days ago by Daniela Applegate
Security Features of the Big 3 Comparison
7 11 days ago by Robert Ficcaglia
Original post by Ian Gallagher
ENISA CYBERSECURITY RESEARCH DIRECTIONS FOR THE EU'S DIGITAL STRATEGIC AUTONOMY
0 13 days ago by Michael Roza
ISO/IEC 24824-4:2021 Information technology - Generic applications of ASN.1 - Part 4: Cryptographic message syntax
0 15 days ago by Michael Roza
Cellebrite and Signal
0 16 days ago by Jim Reavis
Should I share our Company Policies during a security assessment
5 17 days ago by PAUL RICH
Original post by Greg Collins
NISTIR 8356 Considerations for Digital Twin Technology and Emerging Standards: Draft Available for Comment
0 20 days ago by Michael Roza
Coffee with CISOs Invitation: Strengthening Your IAM Program with IGA ft. Garret Grajek
1 21 days ago by VENKAT RAGHAVAN
Original post by Daniela Applegate
Draft: New International Standardization Council Working Group (ISC WG) Charter
0 22 days ago by Shamun Mahmud
NIST Security Assessment Automation with OSCAL -- NEWS: OSCAL 1.0.0 Release Candidate 2 (RC2)
0 22 days ago by Michael Roza
Forescout JSOF Report NameWreck Breaking and Fixing DNS Implementations 202104
0 23 days ago by Michael Roza
NIST Automation of the Cryptographic Module Validation Program (CMVP): NCCoE Project Description For Comment
0 23 days ago by Michael Roza
ISO/IEC TR 24029-1:2021 Artificial Intelligence (AI) - Assessment of the robustness of neural networks - Part 1: Overview
0 24 days ago by Michael Roza
ENISA - CYBERSECURITY CERTIFICATION MARKET STUDY
0 25 days ago by Michael Roza
rThreat Labs Webinar Invitation: The New Frontier of Breach & Attack Emulation
1 28 days ago by Danilo caio da silva vieira silva
Original post by Daniela Applegate
NSA Selecting a Protective DNS Service - UPDATED
0 28 days ago by Michael Roza
Hyperproof webinar invitation: You've done SOC 2, What's Next? (April 22)
0 29 days ago by Jingcong Zhao
New Member - SaaS Questionnaire
0 29 days ago by Anthony Smith
Compilation of Crypto News published in March 2021
0 one month ago by Dhananjoy Dey
NIST has completed the review of the second-round candidates in NIST's lightweight cryptography standardization process.
0 one month ago by Michael Roza
NIST SP1800-27, Securing Property Management Systems.
0 one month ago by Michael Roza
Draft NISTIR 8310, Cybersecurity Framework Election Infrastructure Profile For Comment
0 one month ago by Michael Roza
New publication: Top 20 Critical Controls Implementation for Salesforce
1 one month ago by Ian Sharpe
Original post by Shamun Mahmud
NIST 1800-34a Validating the Integrity of Computing Devices Draft for Comment
0 one month ago by Michael Roza
Call for Participation - Are You a Thought Leader?
0 one month ago by Melisa Williams
You're invited! EMEA Summit | April 13 & 14
0 one month ago by Jaclyn Parton
Draft NISTIR 8360 Machine Learning for Access Control Policy Verification
0 one month ago by Michael Roza
Take the survey: Annual Life and Times of the Cyber Security Professional
0 one month ago by Courtney Stiven
Container scanning guidance released for FedRAMP
3 one month ago by Robert Ficcaglia
Original post by Lorenzo Winfrey
REMINDER: Fugue's CEO Presents on March 24th: A Live Demo of Cloud Misconfiguration Hacks and How to Avoid Them j
0 one month ago by Leah McLean
NCCOE Trusted Internet of Things (IOT) Device Network-Layer Onboarding and Lifecycle Management Draft
2 one month ago by Michael Roza
Cloud Security Offensive Security
1 one month ago by Guillaume Boutisseau
Original post by Sandro Rodrigues
Questions about the release
2 one month ago by Mike Rothman
Original post by Arjun Sawant
Regulation on electronic identification and trust services
0 one month ago by Michael Roza