SP 800-137A, Assessing ISCM Programs: Developing an ISCM Program Assessment | CSRC
https://csrc.nist.gov/publications/detail/sp/800-137a/final
https://csrc.nist.gov/publications/detail/sp/800-137a/final
CSRC | NIST
NIST Special Publication (SP) 800-137A, Assessing Information Security Continuous Monitoring (ISCM) Programs: Developing an ISCM…
This publication describes an approach for the development of Information Security Continuous Monitoring (ISCM) program assessments that can be used to evaluate ISCM programs within federal, state, and local governmental organizations and commercial enterprises.…
Forwarded from RPPA PRO: Privacy • AI • Cybersecurity • IP
#events #cybersecurity #children
Когда: 01 июня в 17:00 по мск
Где: вебинар
Тема: Основы информационной безопасности, для детей
Стоимость: бесплатно
Организатор: КПМГ
Вебинар: доступен по ссылке, без регистрации
В международный день защиты детей КПМГ проведёт обучающий семинар для детей от 11 до 18 лет по основам ИБ.
Успейте подключиться вовремя, количество мест ограничено.
Когда: 01 июня в 17:00 по мск
Где: вебинар
Тема: Основы информационной безопасности, для детей
Стоимость: бесплатно
Организатор: КПМГ
Вебинар: доступен по ссылке, без регистрации
В международный день защиты детей КПМГ проведёт обучающий семинар для детей от 11 до 18 лет по основам ИБ.
Успейте подключиться вовремя, количество мест ограничено.
Ежегодный приказ по планируемым ГОСТ в стране, включая ИБ и ИТ "Программа национальной стандартизации". лучше всего искать соответствующие номера технических комитетов, например, 362. документ живой т.е. в него периодически вносятся правки.
https://www.gost.ru/portal/gost/home/activity/documents/orders#/order/123426
https://www.gost.ru/portal/gost/home/activity/documents/orders#/order/123426
28 мая 2020 ИД «Коммерсантъ», онлайн-конференция
Киберриски удаленной работы
https://www.kommersant.ru/conference/610
Киберриски удаленной работы
https://www.kommersant.ru/conference/610
Getting Ready for Post-Quantum Cryptography: Explore Challenges Associated with Adoption and Use of Post-Quantum Cryptographic Algorithms | CSRC
https://csrc.nist.gov/publications/detail/white-paper/2020/05/26/getting-ready-for-post-quantum-cryptography/draft
https://csrc.nist.gov/publications/detail/white-paper/2020/05/26/getting-ready-for-post-quantum-cryptography/draft
CSRC | NIST
Getting Ready for Post-Quantum Cryptography: Explore Challenges Associated with Adoption and Use of Post-Quantum Cryptographic…
Cryptographic technologies are used throughout government and industry to authenticate the source and protect the confidentiality and integrity of information that we communicate and store. The paper describes the impact of quantum computing technology on…
NICE Webinar: The Challenge of That First Job in Cybersecurity - Entry Level Roles and How to Qualify | NIST
https://www.nist.gov/news-events/events/2020/06/nice-webinar-challenge-first-job-cybersecurity-entry-level-roles-and-how
https://www.nist.gov/news-events/events/2020/06/nice-webinar-challenge-first-job-cybersecurity-entry-level-roles-and-how
NIST
NICE Webinar: The Challenge of That First Job in Cybersecurity - Entry Level Roles and How to Qualify
Трубная металлургическая компания» утвердила стратегию кибербезопасности
https://twitter.com/TAdviser/status/1265538243367522314?s=09
https://twitter.com/TAdviser/status/1265538243367522314?s=09
Twitter
TAdviser
«Трубная металлургическая компания» утвердила стратегию кибербезопасности https://t.co/9gsIpp53M6
The Forrester Wave™: Risk-Based Authentication, Q2 2020
https://reprints.forrester.com/#/assets/2/73/RES157259/reports
https://reprints.forrester.com/#/assets/2/73/RES157259/reports
https://www.helpnetsecurity.com/2020/05/27/underground-market-trends/
Other notable findings include the emergence of markets for:
Deepfake services for sextortion or to bypass photo verification requirements on some sites.
AI-based gambling bots designed to predict dice roll patterns and crack complex Roblox CAPTCHA.
Access-as-a-Service to hacked devices and corporate networks. Prices for Fortune 500 companies can reach up to US$10,000 and some services include access with read and write privileges.
Wearable device accounts where access could enable cybercriminals to run warranty scams by requesting replacement devices.
Other notable findings include the emergence of markets for:
Deepfake services for sextortion or to bypass photo verification requirements on some sites.
AI-based gambling bots designed to predict dice roll patterns and crack complex Roblox CAPTCHA.
Access-as-a-Service to hacked devices and corporate networks. Prices for Fortune 500 companies can reach up to US$10,000 and some services include access with read and write privileges.
Wearable device accounts where access could enable cybercriminals to run warranty scams by requesting replacement devices.
Help Net Security
What's trending on the underground market? - Help Net Security
Underground market trends will likely shift further in the months following the global COVID-19 pandemic, as attack opportunities continue to evolve.
ISACARuSec pinned «https://medium.com/anton-on-security/modern-cyber-defense-books-462e9bc950f7»