Services

Infographics at the NCSC - NCSC Site © Crown copyright

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Effective April 17th 2017, AICPA's New Cybersecurity Risk Management Examination Report

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

I wonder if you can help us?  We're sincerely dedicated to supporting our ISACA, (ISC)2, Security and Risk Management community, but could use your help.  It's not because we want to trick the system. Quite to the contrary, we take pride in two things:

We are not bots - You are not bots

Put another way, we provide real content and you read real content. 

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

New York State Department of Financial Services (DFS)  first-in-the-nation cybersecurity regulation to protect New York State from the ever-growing threat of cyber-attacks is now in effect. DFS Cybersecurity requires banks, insurance companies, and other financial services institutions regulated by DFS to establish and maintain a cybersecurity program designed to protect consumers and ensure the safety and soundness of New York State’s financial services industry.

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Swim Or Die In The Cloud

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

World Class Data Centers tend to get Virtualization and Cloud right - If you want to adapt your business to leverage Cloud and Virtualization, consider starting with education and training in both these areas.

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Whether you understand Cloud frameworks, operating models, taxonomies and deployment options, or not, you are already in the cloud. Cloud computing offers unparalleled business benefits, but only to the extent that it fits in an overall sourcing strategy, meets business needs, and safeguards your investments and data. Successful cloud adoption includes examining the elements of a business case, a careful, staged plan for adoption, and increasing awareness across the variety of players in cloud computing service models. (See How Cloud is Impacting GRC)

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

The goals of Change Management haven't changed, just everything in the path of their achievement - View this presentation full screen.

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

While 15% of EU citizens report not trusting businesses with their information, they also lack the tools to securely manage their own private information.

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Why Risk Management? Enterprise Risk Management has become a mandated business function involving security of the entire organization. If you are tasked with designing an ERM you may be wondering “is my goal to determine if we are secure or if we can enable a more secure enterprise?  Am I expected to engage business partners, to provide meaningful metrics, to inform choices and decisions? Does the organization expect me to account for security responsibilities or am I the provider of a business service?"

… “yes”

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

I went to buy a bed with my sister the other day and the salesman was chatting away telling us how he couldn’t get his state refund because someone had stolen his identity and collected his refund.  

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

RefuseServiceDenial-of-Service Attacks

  • Prevents systems from processing or responding to legitimate traffic
  • Transmits data packets
  • Exploits a known fault in an OS, service or application
  • Results in system crash or CPU at 100%
  • Distributed reflective denial of service DRDoS
  • Reflected approach, rather than direct to victim, manipulates traffic so that attack is reflected back to victim from other sources
  • Example: DNS Poisoning and SMURF

    User Rating: 0 / 5

    Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

What is FIDO? FIDO is the World’s Largest Ecosystem for Standards-Based, Interoperable Authentication
BETTER SECURITY FOR ONLINE SERVICES, REDUCED COST FOR THE ENTERPRISE, SIMPLER AND SAFER FOR CONSUMERS

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

INTERNET of THINGS RESEARCH STUDY - SECURITY AND VULNERABILITY ASSESSMENT

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Firewall Planning and Design

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Center For Internet Security Critical Security Controls V.6.1

User Rating: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Subcategories