CISA’s Zero Trust Maturity Model is one of many roadmaps for agencies to reference as they transition towards a zero trust architecture. The goal of the maturity model is to assist agencies in the development of their zero trust strategies and … [Read more...] about Zero Trust Maturity Model (Draft – For Public Comment)
CISOs, Information Security Managers
Diversity, Equity, and Inclusion in Cybersecurity
It’s estimated that only 4% of cybersecurity workers self-identify as Hispanic, 9% as Black, and 24% as women. The national reckoning on racial justice that began in mid-2020, prompted by the murders of George Floyd, Breonna Taylor, and other Black … [Read more...] about Diversity, Equity, and Inclusion in Cybersecurity
Technology & Security Management HappyHour: Inventory and Control of Enterprise and Software Assets
Join SecureTheVillage Founder & President Dr. Stan Stahl for the next Technology & Security Management HappyHour on September 28th! Discussion Topic: Inventory and Control of Enterprise and Software Assets Description: During … [Read more...] about Technology & Security Management HappyHour: Inventory and Control of Enterprise and Software Assets
Technology & Security Management HappyHour: Meeting Cancelled
Due to unforeseen circumstances we have to cancel this meeting. Description: Join David Lam, Information Security Partner at Miller Kaplan, and Mike Paul, CTO at Innovative Computing Systems for a brutally honest discussion of the challenges, … [Read more...] about Technology & Security Management HappyHour: Meeting Cancelled
Cybersecurity Workforce Working Group
Meeting the Workforce Development Challenge — Matching Skills and Jobs. SecureTheVillage hosts the Cybersecurity Workforce Working Group. Members come from private sector cybersecurity organizations, MSPs, training organizations, education, the … [Read more...] about Cybersecurity Workforce Working Group
Security & Privacy Leadership Team
Discussion Topic: Apple’s plans to scan U.S. iPhones for images of child sexual abuse. What does it mean and what does it portend? Reading List to Prepare: Apple Will Scan U.S. iPhones For Images Of Child Sexual Abuse NPR, August 6, … [Read more...] about Security & Privacy Leadership Team
Information Security Management Webinar: Inserting Risk into the Enterprise Vocabulary with Stevan Bernard
Join #CyberGuardian Stevan Bernard for our next Information Security Management Webinar on September 9th! Title: Inserting Risk into the Enterprise Vocabulary with Stevan Bernard Description: Between the global pandemic and worldwide civil … [Read more...] about Information Security Management Webinar: Inserting Risk into the Enterprise Vocabulary with Stevan Bernard
Breach Case Study – Preparing for the Inevitable with Brad Maryman and Joe Greenfield
SecureTheVillage Technology & Security Management Happy Hour Speakers: Brad Maryman and Dr. Joseph Greenfield of Maryman & Associates Recorded July 27, 2021 Description: Very little is certain in today’s world, but everyone agrees … [Read more...] about Breach Case Study – Preparing for the Inevitable with Brad Maryman and Joe Greenfield
2021 CWE Top 25 Most Dangerous Software Weaknesses
The 2021 Common Weakness Enumeration (CWE™) Top 25 Most Dangerous Software Weaknesses (CWE Top 25) is a demonstrative list of the most common and impactful issues experienced over the previous two calendar years. These weaknesses are dangerous … [Read more...] about 2021 CWE Top 25 Most Dangerous Software Weaknesses
How to Select the Right Level of Outside Support
This is the third in a five-part series on using outside firms to reduce your cybersecurity risk. … [Read more...] about How to Select the Right Level of Outside Support