Cybersecurity was born in January 2008 when National Security Presidential Directive 54 (NSPD-54) and Homeland Security Presidential Directive 23 (HSPD-23) established the Comprehensive National Cybersecurity Initiative (CNCI). Pandemic planning and crisis response are critical business continuity management (BCM) activities that support cyber resilience, which represents the capability of an organization to continue operating in the […]
One of the hardest soft skills to master is conflict resolution. Often, we feel stuck when trying to resolve conflict and negotiate an agreement. Compromise may be the best approach. Professionals adopt a compromising approach when they have an interest in achieving a particular outcome but not to a point where they are willing to […]
Poor cyber security is increasingly affecting all levels of society, whether it is national, local, or personal. With a few strokes of a keyboard, nation states, terrorist groups, stateless organizations, and rogue individuals can launch a cyber-attack from anywhere, at any time, disrupting and damaging our democracy and way of life. To confront the problem, […]
Join us for a lively discussion of Infrastructure as Code (IaC), the hot new way to configure the Cloud. We'll cover: Best practices, Testing and Validation for IaC, Remediation, Fitting IaC into the App Sec PIpeline, Immutable infrastructure, and Is it Security Architecture or Secure Coding? So get your head out of the Cloud for […]