Sublime
An inspiration engine for ideas
Here are some excellent resources related to security integrated with acquisition: Improving Cybersecurity and Resilience through Acquisition. Final Report of the Department of Defense and General Services Administration, published November 2013 (www.gsa.gov/portal/getMediaData?mediaId=185371) NIST Special Publication 800-64 Revision 2: Security Co
... See moreMike Chapple, James M. Stewart, Darril Gibson • Cissp
Shannon Lietz, the person who coined DevSecOps. She says security needs to be designed into an organization’s systems—not something that gets bolted on after the fact. It must be a shared mindset between software developers, operations people, compliance professionals, and security scientists.
John Willis • Deming's Journey to Profound Knowledge: How Deming Helped Win a War, Altered the Face of Industry, and Holds the Key to Our Future

As security engineers, we spend countless hours writing scripts, building… | Ryan Gutwein | 11 comments
Ryan Gutweinlinkedin.com

FISMA/FIPS/NIST RMF
Jordan Genung • CCISO Certified Chief Information Security Officer All-in-One Exam Guide
Cognitive Security
shashaank • 1 card
Architecture Defensibility : With asset inventory in hand, how well is your organization able to defend its digital assets? Does the topology of your enterprise architecture map to the current communication flows? Where are the short circuits in your communication flows? The CRQ examines the robustness of this architecture, focusing on network seg
... See more