NISTIR 8294, Symposium Research on Cybersecurity of EVSE | CSRC
https://csrc.nist.gov/publications/detail/nistir/8294/final
https://csrc.nist.gov/publications/detail/nistir/8294/final
CSRC | NIST
NIST Internal or Interagency Report (NISTIR) 8294, Symposium on Federally Funded Research on Cybersecurity of Electric Vehicle…
Electric vehicles are becoming common on the Nation’s roads, and the electric vehicle supply equipment infrastructure (EVSE) is being created to support that growth. The NIST Information Technology Lab (ITL) hosted a one-day symposium to showcase federally…
Forwarded from Пост Лукацкого
Выложили запись третьего вебинара по ИБ финансовых организаций - в этот раз обсуждали проблемы анализа уязвимостей ПО по ОУД 4. Обсудили много вопросов. https://t.co/4Xgeyfcp1s
— Sergey Borisov (@sb0risov) April 30, 2020
— Sergey Borisov (@sb0risov) April 30, 2020
YouTube
Анализ уязвимостей по требованиям к ОУД4
В ходе вебинара рассмотрены:
- нормативные требования и область их действия
- исходные данные для проведения анализа уязвимостей
- основные этапы и методы оценки
- описание результатов проведения оценки
- нормативные требования и область их действия
- исходные данные для проведения анализа уязвимостей
- основные этапы и методы оценки
- описание результатов проведения оценки
Ransomware mentioned in 1,000+ SEC filings over the past year | ZDNet
https://www.zdnet.com/article/ransomware-mentioned-in-1000-sec-filings-over-the-past-year/
https://www.zdnet.com/article/ransomware-mentioned-in-1000-sec-filings-over-the-past-year/
ZDNET
Ransomware mentioned in 1,000+ SEC filings over the past year
A growing number of public companies have started listing ransomware as a forward-looking risk factor in their SEC documents.
SANS @MIC Talk - Information Security misconceptions 2020 - SANS Institute
https://www.sans.org/webcasts/atmic-talk-information-security-misconceptions-2020-114110
https://www.sans.org/webcasts/atmic-talk-information-security-misconceptions-2020-114110
www.sans.org
SANS @MIC Talk - Information Security misconceptions 2020 - SANS Institute
What are some common security misconceptions in 2020? What are we doing wrong, and how can we improve? This talk will not be technical, but instead set the precedence on how to work security challenges in the future. The talk will cover thought provoking…
Регистрация в веб-семинаре - Zoom
https://sans.zoom.us/webinar/register/2015882608721/WN_i0kvXwEwQzufzfip-mfTXw
https://sans.zoom.us/webinar/register/2015882608721/WN_i0kvXwEwQzufzfip-mfTXw
Interesting metric of privacy - cost per million of consumer records
https://www.helpnetsecurity.com/2020/05/04/ccpa-privacy-requests-cost/
https://www.helpnetsecurity.com/2020/05/04/ccpa-privacy-requests-cost/
Help Net Security
CCPA privacy requests cost business up to $275k per million consumer records - Help Net Security
Processing CCPA privacy requests will likely cost B2C companies $140,000 to $275,000 per one million consumer records, if done manually.
https://www.gartner.com/smarterwithgartner/gartner-top-10-strategic-technology-trends-for-2020
AI security has three key perspectives:
Protecting AI-powered systems: Securing AI training data, training pipelines and ML models.
Leveraging AI to enhance security defense: Using ML to understand patterns, uncover attacks and automate parts of the cybersecurity processes.
Anticipating nefarious use of AI by attackers: Identifying attacks and defending against them.
AI security has three key perspectives:
Protecting AI-powered systems: Securing AI training data, training pipelines and ML models.
Leveraging AI to enhance security defense: Using ML to understand patterns, uncover attacks and automate parts of the cybersecurity processes.
Anticipating nefarious use of AI by attackers: Identifying attacks and defending against them.
Gartner
Gartner Top 10 Strategic Technology Trends For 2020
Hyperautomation, blockchain, AI security, distributed cloud, and autonomous things drive disruption and create opportunities in this year's strategic tech trends.
SP 800-57 Part 1 Rev. 5, Recommendation for Key Management: Part 1 – General | CSRC
https://csrc.nist.gov/publications/detail/sp/800-57-part-1/rev-5/final
https://csrc.nist.gov/publications/detail/sp/800-57-part-1/rev-5/final
CSRC | NIST
NIST Special Publication (SP) 800-57 Part 1 Rev. 5, Recommendation for Key Management: Part 1 – General
This Recommendation provides cryptographic key-management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material, including definitions of the security services that may…
Achieving Data Security and Compliance. How to Safeguard Identity, Protect Information, Reduce Risk and Create Value
White Paper
https://www.isaca.org/bookstore/bookstore-wht_papers-digital/whpdsc?cid=sm_2003844
White Paper
https://www.isaca.org/bookstore/bookstore-wht_papers-digital/whpdsc?cid=sm_2003844