Artifact_Type |
Title |
Description |
 |
|
This provides a summary structured in an easy to read manner of NIST 800-171 publication addressing how Unclassified Data is to be handled by Gov Contractors levering 3rd Party Service Providers and/or Internal Resources. |
 |
|
This provides a summary on what is considered PII, what are the key items reviewed during an assessment process, what are the consequences for failing to protect PII data, and a general overview of how PII controls impact the security assessment process at the organization level. |
Small Business Security Services Overview
|
Artifact_Type |
Title |
Description |
 |
|
This presentation provides an overview of key security requirements delineated by the Internal Revenue Service(IRS) to be followed by all individuals processing tax documentation. |
 |
|
This presentation provides an overview of key security requirements currently under developmet for Real Estate based businesses and what Realtors must do to comply with the upcoming requirements. |
Enterprise Risk Management (ERM)
|
Artifact_Type |
Title |
Description |
 |
|
This presentation provides a high level overview on how the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) functions and the importance of an Enterprise Assessment. |
 |
|
This presentation provides an overview of the NIST ERM Framework Tier 1: Organization and its importance as part of an Enterprise Level Assessment. |
 |
|
This presentation provides an overview of the NIST ERM Framework Tier 2: Mission/Business Objectives and its importance as part of an Enterprise Level Assessment. |
 |
|
This presentation provides an overview of the NIST ERM Framework Tier 3: Information System and its importance as part of an Enterprise Level Assessment. |
 |
|
This presentation provides an overview on how the Security Assessment Process functions and what is required prior to undergoing an assessment. |
Cloud Computing
|
Artifact_Type |
Title |
Description |
 |
|
This presentation provides a high level overview of all the key items noted below with minimun details. |
 |
|
This presentation provides a high level overview on the history of Virtualization Technology and how it evolved into a solution for Cloud Computing. |
 |
|
This presentation provides a high level overview of the four (4) cloud deployments strategies. |
 |
|
This presentation provides a high level overview of the typical Cloud Actors and their respective role within a cloud environment. |
 |
|
This presentation provides an overview of the Infrastructure As A Service (IaaS) Cloud Model and some of the security concerns that the consumer and/or future service provider must consider. |
 |
|
This presentation provides an overview of the Platform As A Service (IaaS) Cloud Model and some of the security concerns that the consumer and/or future service provider must consider. |
 |
|
This presentation provides an overview of the Software As A Service (IaaS) Cloud Model and some of the security concerns that the consumer and/or future service provider must consider. |
 |
|
This presentation provides an overview of the Container As A Service (IaaS) Cloud Model and some of the security concerns that the consumer and/or future service provider must consider. |
CyberSecurity
|
Artifact_Type |
Title |
Description |
 |
|
This presentations summarizes the NIST Cybersecurity Framework in a easy to follow format. |
 |
|
This spreadsheets provides a breakdowns of the security controls required and applicable to the NIST CyberSecurity Framework v1.1 |
 |
|
This provides an overview on how ERM and Cybersecurity must be integrated to function properly as part of the BIG Picture to ensure organizations lower cyber-attacks while understanding the unique risks tied to their organization. |
 |
|
This provides an overview of the Defensive Component and the teams that commonly fall within this component as well as the associated responsibilities. |
 |
|
This provides an overview of the Offensive Component and the teams that commonly fall within this component as well as the associated responsibilities. |
 |
|
This provides an overview of what a Penetration Test is, general guidance and the teams responsible for executing such. |
Ad-Hoc Items
|
Artifact_Type |
Title |
Description |
 |
|
This provides an overview of what to be on the lookout when someone tries to scam individuals going through a foreclosure process. |