see-secure.com
מימשל אבטחת מידע: חוק, תקן ורגולציה - See Secure Consulting
http://www.see-secure.com/מימשל_אבטחת_מידע:_חוק,_תקן_ורגולציה
הסברים לתת-עולמות אבטחת מידע. תחומי יעוץ באבטחת מידע וסייבר. תכנון מערך אבטחת מידע ויעוץ אסטרטגי. ניהול סיכונים והערכת סיכונים. ניהול המשכיות עסקית BCM. ניהול ידע לאנשי אבטחת המידע. ניהול מלא לאבטחת מידע (CISO Roll). מימשל אבטחת מידע: חוק, תקן ורגולציה. ניהול מודעות עובדים לאבטחת מידע. מבדקי חוסן למערכות ולתהליכים. ניטור רשתות ומערכות לאבטחת מידע. טלפונים סלולריים ורשתות חברתיות. תשתיות מיוחדות (SCADA, Embedded). הקשחת קוד והקשחת יישומים. Cyber Defense Department Design and Method. מספר רגולציות ותקני אב...
evidencebasedenterprise.com
Applying evidence of vulnerabilities to support architectural design and change | Evidence Based Enterprise Architecture and Cyber Defence
https://evidencebasedenterprise.com/2014/04/10/test
Enter your email address to follow this blog and receive notifications of new posts by email. Join 2 other followers. Architectural Statement of Work. Evidence Based Enterprise Architecture. Applying evidence of threat to support architecture design and change. Enter your email address to subscribe to this blog and receive notifications of new posts by email. Join 2 other followers. Architectural Statement of Work. Evidence Based Enterprise Architecture. The power of semantic technologies. Opportunistic ...
evidencebasedenterprise.com
Vulnerability Management | Evidence Based Enterprise Architecture and Cyber Defence
https://evidencebasedenterprise.com/category/cyber-defence/vulnerability-management
Applying evidence of threat to support architecture design and change. Applying evidence of risk to support architectural design and change. Cyber Security Ontology and Cyber Defence Ontology. SecONT 2014 Workshop on Security Ontologies and Taxonomies. Enter your email address to follow this blog and receive notifications of new posts by email. Join 2 other followers. Architectural Statement of Work. Evidence Based Enterprise Architecture. Join 2 other followers. Architectural Statement of Work. If we be...
evidencebasedenterprise.com
Enterprise Architecture Repository | Evidence Based Enterprise Architecture and Cyber Defence
https://evidencebasedenterprise.com/category/enterprise-architecture/enterprise-architecture-repository
Applying evidence of threat to support architecture design and change. Applying evidence of risk to support architectural design and change. Cyber Security Ontology and Cyber Defence Ontology. SecONT 2014 Workshop on Security Ontologies and Taxonomies. Enter your email address to follow this blog and receive notifications of new posts by email. Join 2 other followers. Architectural Statement of Work. Evidence Based Enterprise Architecture. Join 2 other followers. Architectural Statement of Work. If we be...
dorlov.blogspot.com
Информационная безопасность: Дайджест ИБ за 07 - 13 ноября 2011 года
http://dorlov.blogspot.com/2011/11/07-13-2011.html
Стандарты и лучшие практики. Полезные сайты и инструменты. Воскресенье, 13 ноября 2011 г. Дайджест ИБ за 07 - 13 ноября 2011 года. Обзор самых интересных и полезных сообщений за неделю в блогах по информационной безопасности и не только :-). Лучшие посты из русскоязычных блогов по ИБ. Лучшие посты из англоязычных блогов по ИБ. Стандарты, руководства, лучшие практики, исследования. Лучшие посты из русскоязычных блогов по ИБ. Алексей Лукацкий опубликовал серию постов на тему взаимодействия ИБ и бизнеса.
sabsaworld.org
24 Hours of SABSA -- January 21, 2016
http://www.sabsaworld.org/8-news/1-24sabsa
24 Hours of SABSA - January 21, 2016. So far SABSAWorld, and the SABSA Community have helped coordinate meetings in 20 cities, across 11 different countries! This year for "24 Hours of SABSA" we will have meetings on January 21st, 2016. In this 3rd year, we are excited to build on the existing networks and relationships and continue encouraging growth in the SABSA community. We hope you will participate in your community and help make this a success! What will you get out of it? USA - Los Angeles. To get...
kstennes.wordpress.com
Hva slags rammeverk skal jeg bruke i dag? | Blog om sikkerhet og identitetsforvaltning
https://kstennes.wordpress.com/2011/05/13/rammeverk
Blog om sikkerhet og identitetsforvaltning. En blog om sikkerhet og IAM. Laquo; Hvor bommer vi på sikkerhetsarbeidet. Cool Vendors in Identity and Access Management. Hva slags rammeverk skal jeg bruke i dag? 13May, 2011 by Kåre Magne. Ofte dukker spørsmålet opp: Hvilket rammeverk eller hvilken standard skal jeg bruke for å oppnå tilfredsstillende sikkerhet? Svaret er ikke alltid like enkelt å svare på, men etter å selv å ha hatt et “moment of clarity” forsøker jeg meg på et svar likevel. Administrasjon a...
sealmindset.blogspot.com
Security Enthusiast Always Learning: October 2015
http://sealmindset.blogspot.com/2015_10_01_archive.html
Security Enthusiast Always Learning. This blog represents a fraction of the mindset of a security enthusiast who is always learning new things about information security. Saturday, October 10, 2015. At times VPN can be such a monstrosity its not worth the overhead. It ensues. I just need the comforting beacon of a command prompt and always there when you need it; SSH. The following are the steps I've taken to create a tranquil state of pragmatism. Retype new UNIX password:. Re-enter the same password].
it-beveiligers.nl
Werkwijze - IT Beveiligers Nederland
http://www.it-beveiligers.nl/werkwijze.html
Wij ondersteunen het SABSA-model voor de inrichting van IT-beveiliging in organisaties. In dit model wordt aandacht besteed aan alle aspecten van IT-beveiliging in samenhang met de de vraag welke beveiligingsmaatregelen noodzakelijk zijn en waarom. Daarbij wordt duidelijk hoe de beveiliging is ingericht en wie daarvoor verantwoordelijk is. Meer informatie over SABSA is te vinden op de website van de SABSA-organisatie: www.sabsa.org. Classificatie en beheer van bedrijfsmiddelen.
SOCIAL ENGAGEMENT