NISTIR 8286 (Draft), Integrating Cybersecurity and Enterprise Risk Management (ERM) | CSRC
https://csrc.nist.gov/publications/detail/nistir/8286/draft
https://csrc.nist.gov/publications/detail/nistir/8286/draft
CSRC | NIST
NIST Internal or Interagency Report (NISTIR) 8286 (Withdrawn), Integrating Cybersecurity and Enterprise Risk Management (ERM)
The increasing frequency, creativity, and variety of cybersecurity attacks means that all enterprises should ensure cybersecurity risk is getting the appropriate attention within their enterprise risk management (ERM) programs. This document is intended to…
FIPS 140-3, Security Requirements for Cryptographic Modules | CSRC
https://csrc.nist.gov/publications/detail/fips/140/3/final
https://csrc.nist.gov/publications/detail/fips/140/3/final
CSRC | NIST
Federal Information Processing Standard (FIPS) 140-3, Security Requirements for Cryptographic Modules
The selective application of technological and related procedural safeguards is an important responsibility of every federal organization in providing adequate security in its computer and telecommunication systems. This standard is applicable to all federal…
Блог Сергея Борисова про ИБ: Подборка рекомендаций и предложений мира ИБ во имя коронавируса
https://sborisov.blogspot.com/2020/03/blog-post_23.html?m=1
https://sborisov.blogspot.com/2020/03/blog-post_23.html?m=1
Blogspot
Подборка рекомендаций и предложений мира ИБ во имя коронавируса
В статье приводится подборка рекомендаций по мерам информационной безопасности и спец. предложения от производителей
Our colleagues from Antiphish, a security awareness and behavioural management provider, will deliver a webinar aimed at this Friday (NY 11.00, Amsterdam 16.00, Moscow 19.00) to educate on “How to work from home” in a secure fashion. This webinar will cover classic security tips and review a few advanced security automation techniques that can help cope with the challenge of working from home for an entire enterprise. https://zoom.us/webinar/register/3115847340133/WN_LGqjWbKgTuibEtQzjoYK4Q
SP 800-56C Rev. 2 (Draft), Key-Derivation Methods in Key-Establishment Schemes | CSRC
https://csrc.nist.gov/publications/detail/sp/800-56c/rev-2/draft
https://csrc.nist.gov/publications/detail/sp/800-56c/rev-2/draft
CSRC | NIST
NIST Special Publication (SP) 800-56C Rev. 2 (Draft), Recommendation for Key-Derivation Methods in Key-Establishment Schemes
This Recommendation specifies techniques for the derivation of keying material from a shared secret established during a key-establishment scheme defined in NIST Special Publications 800-56A or 800-56B.
SP 800-124 Rev. 2 (Draft), Managing the Security of Mobile Devices in the Enterprise | CSRC
https://csrc.nist.gov/publications/detail/sp/800-124/rev-2/draft
https://csrc.nist.gov/publications/detail/sp/800-124/rev-2/draft
CSRC | NIST
NIST Special Publication (SP) 800-124 Rev. 2 (Withdrawn), Guidelines for Managing the Security of Mobile Devices in the Enterprise
Mobile devices were initially personal consumer communication devices but they are now permanent fixtures in enterprises and are used to access modern networks and systems to process sensitive data. This publication assists organizations in managing and securing…
NIST Releases Online Economic Decision Tool to Help Communities Plan for Disaster | NIST
https://www.nist.gov/news-events/news/2020/03/nist-releases-online-economic-decision-tool-help-communities-plan-disaster
https://www.nist.gov/news-events/news/2020/03/nist-releases-online-economic-decision-tool-help-communities-plan-disaster
DISC SANS Virtual Conference - SANS Institute
https://www.sans.org/webcasts/114285
https://www.sans.org/webcasts/114285
www.sans.org
DISC SANS ICS Virtual Conference - SANS Institute
{{!This virtual conference will be held over Zoom due to the size of the audience (multiple thousand). SANS has evaluated the claims around Zoom's security and have found, collectively with our national partners, Zooms response to the concerns to be appropriate.It…