Cybersecurity was born in January 2008 when National Security Presidential Directive 54 (NSPD-54) and Homeland Security Presidential Directive 23 (HSPD-23) established the Comprehensive National Cybersecurity Initiative (CNCI). Pandemic planning and […]
One of the hardest soft skills to master is conflict resolution. Often, we feel stuck when trying to resolve conflict and negotiate an agreement. Compromise may be the best approach. […]
Poor cyber security is increasingly affecting all levels of society, whether it is national, local, or personal. With a few strokes of a keyboard, nation states, terrorist groups, stateless organizations, and rogue individuals can launch a cyber-attack from anywhere, at any time, disrupting and damaging our democracy and way of life. To confront the problem, […]
Join us for a lively discussion of Infrastructure as Code (IaC), the hot new way to configure the Cloud. We'll cover: Best practices, Testing and Validation for IaC, Remediation, Fitting IaC into the App Sec PIpeline, Immutable infrastructure, and Is it Security Architecture or Secure Coding? So get your head out of the Cloud for […]