https://twitter.com/schneierblog/status/1337424409007570952
US cybersecurity agenda for the next 4 years by Aspen Institute:
Education and Workforce Development
Public Core Resilience
Supply Chain Security
Measuring Cybersecurity
Promoting Operational Collaboration
US cybersecurity agenda for the next 4 years by Aspen Institute:
Education and Workforce Development
Public Core Resilience
Supply Chain Security
Measuring Cybersecurity
Promoting Operational Collaboration
Twitter
Schneier Blog
A Cybersecurity Policy Agenda https://t.co/B9RnE8ATCe
ENISA AI Threat Landscape Report Unveils Major Cybersecurity Challenges — ENISA
https://www.enisa.europa.eu/news/enisa-news/enisa-ai-threat-landscape-report-unveils-major-cybersecurity-challenges
https://www.enisa.europa.eu/news/enisa-news/enisa-ai-threat-landscape-report-unveils-major-cybersecurity-challenges
ENISA
ENISA AI Threat Landscape Report Unveils Major Cybersecurity Challenges
New report maps the assets and threats of Artificial Intelligence (AI), and sets a baseline for securing the AI ecosystem across Europe.
Интервью с Андреем Прозоровым о подходе к управлению ИБ
https://cisoclub.ru/intervyu-s-andreem-prozorovym-po-upravleniyu-ib/
https://cisoclub.ru/intervyu-s-andreem-prozorovym-po-upravleniyu-ib/
CISOCLUB
Интервью с Андреем Прозоровым о подходе к управлению ИБ | CISOCLUB
Мы пообщались с Андреем Прозоровым о подходе к управлению ИБ, узнали какие стандарты и методологии лучше использовать, как выбрать наиболее подходящую модель менеджмента ИБ и построить эффективную систему управления информационной безопасностью в компании.…
Security Control Mappings: A Bridge to Threat-Informed Defense | by Jon Baker | MITRE-Engenuity | Dec, 2020 | Medium
https://medium.com/mitre-engenuity/security-control-mappings-a-bridge-to-threat-informed-defense-2e42a074f64a
https://medium.com/mitre-engenuity/security-control-mappings-a-bridge-to-threat-informed-defense-2e42a074f64a
Medium
Security Control Mappings: A Bridge to Threat-Informed Defense
Written by Tiffany Bergeron and Jon Baker.
Rounding Up Your IoT Security Requirements: Draft NIST Guidance for Federal Agencies | NIST
https://www.nist.gov/blogs/cybersecurity-insights/rounding-your-iot-security-requirements-draft-nist-guidance-federal
https://www.nist.gov/blogs/cybersecurity-insights/rounding-your-iot-security-requirements-draft-nist-guidance-federal
NIST
Rounding Up Your IoT Security Requirements: Draft NIST Guidance for Federal Agencies
IoT devices are becoming integral elements of federal information systems, which is why NIST has released for
Cybersecurity in the Maritime Sector: ENISA Releases New Guidelines for Navigating Cyber Risk — ENISA
https://www.enisa.europa.eu/news/enisa-news/cybersecurity-in-the-maritime-sector-enisa-releases-new-guidelines-for-navigating-cyber-risk
https://www.enisa.europa.eu/news/enisa-news/cybersecurity-in-the-maritime-sector-enisa-releases-new-guidelines-for-navigating-cyber-risk
ENISA
Cybersecurity in the Maritime Sector: ENISA Releases New Guidelines for Navigating Cyber Risk
The European Union Agency for Cybersecurity provides port operators with a set of good practices to help them identify and evaluate cyber risks, and effectively identify suitable security measures.