Services

(ISC)2 East Bay Chapter Conference - August 4th, 2017

Thank you to our sponsors Allgress and Securonix

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

http://www.enisa.europa.eu/publications

http://www.enisa.europa.eu/publications

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

This is -- Scott Schnoll, Senior Program Manager, Office 365 Customer Experience

Scott Schnoll

If this is the information you seek to properly implement or audit Microsoft Office 365, Go back to the source 

We've thoroughly consumed this information because we are an Office 365 shop.  If you have clients using 365, or if you are using Microsoft products, then you should too.

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

This is an iframe.  The CSA site uses cookies.  Please identify the important content from this frame and then go directly to the CSA site for more information.

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

To effectively use this critical security content, you need to do two things; become a CIS member, (it costs nothing and offers tremendous value), and two, become a contributor and participant. 

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Center For Internet Security Critical Security Controls V.6.1

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

AICPA Service Organization Control Reports - SOC 2

“If your company currently uses third-party vendors to provide services that include the collection, processing and/or retention of sensitive information, you should consider inquiring into whether they have successfully completed a SOC 2 Type 2 audit, as it helps to ensure a higher standard for protecting your data.” Jeanne Madden, Vice President Operations, ADP Tax Credit Services

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Many Users Many Assessments

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Networking and Security concepts are critical to assessing security policy in networked and cloud environments.

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
CIS CSC and 80/20

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

 

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Assessment Services - EnterpriseGRC Solutions, Implementing a Compliance Framework

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

The foundations of Control Objectives for Information Technology, or Cobit, are especially useful in planning for or assessment of any governance program.  Now superceded by Cobit 5, the Cobit 4 curriculum offers relevant learning.  For more information about trainings in IT Governance, visit https://ISACA.org or http://ITpreneurs.com  

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Often those unfamiliar with building a comprehensive Business Continuity Program will not be aware that just downloading and filling in a template from the internet to check a task box is not the appropriate solution for protecting your business.  Using the 12 components for Business Continuity Planning and maturing over time through exercising and continuous improvement practices will increase the chances of recovery in times of crisis. 

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

The Next Great Outage – What It Really Takes to Apply General Computing Controls to Cloud & Virtualized Environments

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

CHALLENGE - NIST Cybersecurity Framework for Improving Critical Infrastructure

Order 13636 requires accountability to assure cyber-security readiness, requiring Financial, Communications, Manufacturing, Defense, Energy, Emergency Services, Food and Agriculture, Healthcare, IT, Utilities, Chemical, Water, Nuclear Reactors, Materials, & Waste and Transportation sectors to initiate voluntary compliance with the NIST Cybersecurity Framework.

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Notes from Attendees Workshop, ISACA SV - The Next Great Outage

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
Virtualization Risk

Cloud Computing is easily the highest rated topic in current technology design, implementation, and control. No successful enterprise will circumvent the use of virtualization.  

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Subcategories