Sublime
An inspiration engine for ideas

Here are some excellent resources related to security integrated with acquisition: Improving Cybersecurity and Resilience through Acquisition. Final Report of the Department of Defense and General Services Administration, published November 2013 (www.gsa.gov/portal/getMediaData?mediaId=185371) NIST Special Publication 800-64 Revision 2: Security Co
... See moreMike Chapple, James M. Stewart, Darril Gibson • Cissp
Microsoft Certified: Identity and Access Administrator Associate - Certifications
Microsoftlearn.microsoft.com
More recently, in an important move toward consolidation in ESG standards, in 2020, SASB has announced a merger with IIRC to take place by mid-2021.29 The merger is meant to simplify ESG disclosures.
Diana Barrero Zalles • Transparency in ESG and the Circular Economy: Capturing Opportunities Through Data
Overview - C2PA Menu OpenMenu Close
c2pa.orgSound cybersecurity practices and risk management are a differentiator for many non-regulated companies and are table stakes for highly regulated organizations. Enterprise customers are demanding and driving the conversation around cybersecurity.
They are demanding to understand how their vendors could potentially impact their customers and their re
... See morebacohido • Best Practices Q&A: Guidance About What Directors Need to Hear From CISOs — From a Board Member
Information Governance: Concepts, Strategies, and Best Practices (Wiley CIO Book 574)
amazon.com
Architecture Defensibility : With asset inventory in hand, how well is your organization able to defend its digital assets? Does the topology of your enterprise architecture map to the current communication flows? Where are the short circuits in your communication flows? The CRQ examines the robustness of this architecture, focusing on network seg
... See moreRik Ferguson • The Cybersecurity Resilience Quotient Measuring Security Effectiveness
Security is aimed at preventing loss or disclosure of data while sustaining authorized access. The possibility that something could happen to damage, destroy, or disclose data or other resources is known as risk. Understanding risk management concepts is not only important for the CISSP exam, it’s also essential to the establishment of a sufficient
... See more