January 30, 2024

The initial public draft of NIST Internal Report (IR) 8504, Access Control on NoSQL Databases, is now available for public comment. The deadline to submit comments is March 15, 2024.

CCM v4.0 Addendum - ECUC PP v2.1

CCM v4.0 Addendum - ECUC PP v2.1
Release Date: 02/12/2024

This document is an addendum to the 'ECUC Position Paper v2.1 (ECUC PP v2.1) that contains controls mapping between the CSA CCM v4.0 and the ECUC PPv2.1. ...

Request to download
Blog

How Does PCI DSS 4.0 Affect Web Application Firewalls?

The payment industry is bracing for the transition to Payment Card Industry Data Security Standard (PCI DSS) 4.0 , heralding significant changes in cybersecurity practices. As we approach the implementation of this revised standard, a critical focal point emerges: the role and new mandate of web application firewalls (WAFs) in ensuring compliance. The shift from a best practice to a prescribed...
FULL WORKSHOP DETAILS NIST will host a workshop on the development of a new block cipher mode of operation on June 20-21, 2024, at the National Cybersecurity Center of Excellence in Rockville, Maryland. Workshop Announcement/Call for Abstracts (PDF)
The Iris Experts Group (IEG) will hold their annual meeting on Thursday June 13, 2024. The meeting will be virtual using the Zoom Meeting platform. The meeting is a full day meeting with breaks scattered through the day. The IEG is a forum for the
Speakers: To be announced. Synopsis: Join us for an insightful webinar exploring refugees' invaluable contributions to the cybersecurity landscape. The demand for skilled cybersecurity professionals continues to grow in today's rapidly evolving

FedTalks

Jun 5, 2024

Andrew Mellon Auditorium

Register
Standardizing Security in Diverse Sectors: A Template for STAR-Aligned Sector-Specific Standards

Standardizing Security in Diverse Sectors: A Template for STAR-Aligned Sector-Specific Standards
Release Date: 03/06/2024

The CSA Security, Trust, Assurance, and Risk (STAR) program encompasses the key principles of transparency, rigorous auditing, and harmonization of cybers...

Request to download
Blog

So You Want to Achieve NERC CIP-013-1 Compliance...

Energy efficiency and availability is a major concern for all countries and governments. The electric grid is a vital sector, and any malfunctions will create ripple effects on any nation’s economy. As the grid is heavily dependent on cyber-enabled technologies and a vast chain of suppliers, contractors, and partners, the ability to safeguard the availability and reliability of the grid is crucial...
Blog

So You Want to Achieve NERC CIP-013-1 Compliance...

Energy efficiency and availability is a major concern for all countries and governments. The electric grid is a vital sector, and any malfunctions will create ripple effects on any nation’s economy. As the grid is heavily dependent on cyber-enabled technologies and a vast chain of suppliers, contractors, and partners, the ability to safeguard the availability and reliability of the grid is crucial...
Blog

The Dangers of Default: Cybersecurity in the Age of Intent-Based Configuration

Technology has recently been evolving at the speed of light. We have seen the onset of increased cyber threats across all industries. Gone are the times when threat actors had a specific goal and target. We now live in an age where robots collect, collate, and save information for a more opportune and profitable day. It is ever more important to understand the security measures individuals and...
April 3, 2024

The initial public draft of Special Publication (SP) 800-61r3 (Revision 3), "Incident Response Recommendations and Considerations for Cybersecurity Risk Management: A CSF 2.0 Community Profile," is available for public comment, with comments due by May 20, 2024.

April 3, 2024

An initial public draft of Cybersecurity White Paper (CSWP) 33, "Product Development Cybersecurity Handbook: Concepts and Considerations for IoT Product Manufacturers" is now available for public comment through May 17, 2024.

Speakers: To be announced. Synopsis: Youth apprenticeship delivers paid work-based learning to students still enrolled in high school, as well as recent graduates. As cybersecurity and technology stakeholders in government, industry, and the
Defining the Zero Trust Protect Surface

Defining the Zero Trust Protect Surface
Release Date: 03/05/2024

Enterprise adoption and implementation of Zero Trust is broad and growing. Venture Beat reports that 90% of organizations moving to the cloud are adopting...

Request to download

For those with both, how hard is the CCP exam (and CCA) compared to CISSP?

submitted by /u/Tigers1195
[link] [comments]
Defining Shadow Access: The Emerging IAM Security Challenge - Japanese Translation

Defining Shadow Access: The Emerging IAM Security Challenge - Japanese Translation
Release Date: 04/29/2024

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Loading ...