Сводка всех активностей Google по ИБ связанных с облачными технологиями
https://cloud.google.com/blog/products/identity-security/ciso-perspectives-april-2021
https://cloud.google.com/blog/products/identity-security/ciso-perspectives-april-2021
Google Cloud Blog
CISO Perspectives: April 2021 | Google Cloud Blog
Google Cloud CISO Phil Venables shares his perspective on industry news from spring 2021 and updates from Google’s security team.
The National Institute of Standards and Technology’s (NIST) National Cybersecurity Center of Excellence (NCCoE) has published for comment a preliminary draft of NIST SP 1800-32, Securing the Industrial Internet of Things: Cybersecurity for Distributed Energy Resources.
https://www.nccoe.nist.gov/projects/use-cases/energy-sector/iiot
https://www.nccoe.nist.gov/projects/use-cases/energy-sector/iiot
Webcast: Defining an XDR strategy: What does it mean for your organization? | This upcoming session featuring SANS analyst Dave Shackleford is designed to explore the pros and cons of XDR. Attendees will walk away with a better understanding of: How to define what XDR means for your organization, how to create your own XDR strategy, and more! | April 22nd @ 3:30 PM EDT | https://www.sans.org/info/219520
Webcast: Belkasoft X—a new computer and mobile forensics tool to accelerate your DFIR investigations | Join SANS analyst Jake Williams as we explores Belkasoft X, a new digital forensics and incident investigations product. Attendees will get a trial license of the tool and attendance certificates! | April 28th @ 3:30 PM EDT | https://www.sans.org/info/219525
Webcast: Operational Technology Security in the Age of Smart Manufacturing | Join this webcast to discuss OT environments and how they are impacting todays smart manufacturing. | April 29th @ 1:00 PM EDT | https://www.sans.org/info/219530
Webcast: Belkasoft X—a new computer and mobile forensics tool to accelerate your DFIR investigations | Join SANS analyst Jake Williams as we explores Belkasoft X, a new digital forensics and incident investigations product. Attendees will get a trial license of the tool and attendance certificates! | April 28th @ 3:30 PM EDT | https://www.sans.org/info/219525
Webcast: Operational Technology Security in the Age of Smart Manufacturing | Join this webcast to discuss OT environments and how they are impacting todays smart manufacturing. | April 29th @ 1:00 PM EDT | https://www.sans.org/info/219530
www.sans.org
Defining an XDR strategy: What does it mean for your organization? - SANS Institute
XDR (extended detection and response) is the hot new buzzword in the security industry but so far there isn't a lot of agreement on what defines XDR. The goal makes sense. Extend your detection capabilities across your hybrid network to catch advanced threats…
Forwarded from Пост Лукацкого
Выступал на Retail TECH с коротенькой презентацией, которую выложил в канал - https://t.co/O7OYBt6Gk6 pic.twitter.com/Sqij5pfskX
— Alexey Lukatsky (@alukatsky) April 22, 2021
— Alexey Lukatsky (@alukatsky) April 22, 2021
Telegram
Пост Лукацкого
SP 800-82 Rev. 3 (Draft), Guide to Industrial Control Systems (ICS) Security | CSRC
https://csrc.nist.gov/publications/detail/sp/800-82/rev-3/draft
https://csrc.nist.gov/publications/detail/sp/800-82/rev-3/draft
CSRC | NIST
NIST Special Publication (SP) 800-82 Rev. 3 (Withdrawn), Guide to Operational Technology (OT) Security
This document provides guidance on how to secure operational technology (OT), while addressing their unique performance, reliability, and safety requirements. OT encompasses a broad range of programmable systems and devices that interact with the physical…
The Defending Against Software Supply Chain Attacks, released by CISA and the National Institute of Standards and Technology (NIST), provides an overview of software supply chain risks and recommendations on how software customers and vendors can use the NIST Cyber Supply Chain Risk Management (C-SCRM) Framework and the Secure Software Development Framework (SSDF) to identify, assess, and mitigate software supply chain risks.
https://www.cisa.gov/publication/software-supply-chain-attacks
https://www.cisa.gov/publication/software-supply-chain-attacks
www.cisa.gov
Software Supply Chain Attacks | CISA
The Defending Against Software Supply Chain Attacks, released by CISA and the National Institute of Standards and Technology (NIST), provides an overview of software supply chain risks and recommendations on how software customers and vendors can use the…
SP 800-172A (Draft), Assessing Enhanced Security Requirements for CUI | CSRC
https://csrc.nist.gov/publications/detail/sp/800-172A/draft
https://csrc.nist.gov/publications/detail/sp/800-172A/draft
CSRC | NIST
NIST Special Publication (SP) 800-172A (Draft), Assessing Enhanced Security Requirements for Controlled Unclassified Information
The protection of Controlled Unclassified Information (CUI) in nonfederal systems and organizations is important to federal agencies and can directly impact the ability of the Federal Government to successfully carry out its assigned missions and business…