Welcome to CyberAdeptness LLC

Therefore, we have this small library to help you grasp the concepts we leverage!

Artifact_Type

Title

Description

PDF

NIST 800-171:Handling Controlled Unclassified Data Summary

This provides a summary structured in an easy to read manner of NIST 800-171 publication addressing how Unclassified Data is to be handled by Gov Contractors levering 3rd Party Service Providers and/or Internal Resources.
PDF

Personally Identifiable Information (PII) Data Summary

This provides a summary on what is considered PII, what are the key items reviewed during an assessment process, what are the consequences for failing to protect PII data, and a general overview of how PII controls impact the security assessment process at the organization level.

Small Business Security Services Overview

 

Artifact_Type

Title

Description

PDF

Tax Consultants Overview

This presentation provides an overview of key security requirements delineated by the Internal Revenue Service(IRS) to be followed by all individuals processing tax documentation.
PDF

Real Estate Realtors Overview

This presentation provides an overview of key security requirements currently under developmet for Real Estate based businesses and what Realtors must do to comply with the upcoming requirements.

Enterprise Risk Management (ERM)

 

Artifact_Type

Title

Description

PDF

ERM Assessment Overview

This presentation provides a high level overview on how the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) functions and the importance of an Enterprise Assessment.
PDF

ERM Tier 1: Organization Overview

This presentation provides an overview of the NIST ERM Framework Tier 1: Organization and its importance as part of an Enterprise Level Assessment.
PDF

ERM Tier 2: Mission/Business Objective Overview

This presentation provides an overview of the NIST ERM Framework Tier 2: Mission/Business Objectives and its importance as part of an Enterprise Level Assessment.
PDF

ERM Tier 3: Infomation Systems Overview

This presentation provides an overview of the NIST ERM Framework Tier 3: Information System and its importance as part of an Enterprise Level Assessment.
PDF

Security Accreditation Assessments Overview

This presentation provides an overview on how the Security Assessment Process functions and what is required prior to undergoing an assessment.

Cloud Computing

 

Artifact_Type

Title

Description

PDF

Cloud In A Nutshell

This presentation provides a high level overview of all the key items noted below with minimun details.
PDF

Cloud Overview

This presentation provides a high level overview on the history of Virtualization Technology and how it evolved into a solution for Cloud Computing.
PDF

Cloud Deployment Types

This presentation provides a high level overview of the four (4) cloud deployments strategies.
PDF

Cloud Key Players aka Actors

This presentation provides a high level overview of the typical Cloud Actors and their respective role within a cloud environment.
PDF

Infrastructure As A Service (IaaS) Model

This presentation provides an overview of the Infrastructure As A Service (IaaS) Cloud Model and some of the security concerns that the consumer and/or future service provider must consider.
PDF

Platform As A Service (PaaS) Model

This presentation provides an overview of the Platform As A Service (IaaS) Cloud Model and some of the security concerns that the consumer and/or future service provider must consider.
PDF

Software As A Service (SaaS) Model

This presentation provides an overview of the Software As A Service (IaaS) Cloud Model and some of the security concerns that the consumer and/or future service provider must consider.
PDF

Container As A Service (CaaS) Model

This presentation provides an overview of the Container As A Service (IaaS) Cloud Model and some of the security concerns that the consumer and/or future service provider must consider.

CyberSecurity

 

Artifact_Type

Title

Description

PDF

Summary of NIST CyberSecurity Framework v1.1

This presentations summarizes the NIST Cybersecurity Framework in a easy to follow format.
excel

Summary of NIST CyberSecurity Framework v1.1 Controls Spreadsheet

This spreadsheets provides a breakdowns of the security controls required and applicable to the NIST CyberSecurity Framework v1.1
PDF

Cybersecurity Overview

This provides an overview on how ERM and Cybersecurity must be integrated to function properly as part of the BIG Picture to ensure organizations lower cyber-attacks while understanding the unique risks tied to their organization.
PDF

Defensive Security Overview

This provides an overview of the Defensive Component and the teams that commonly fall within this component as well as the associated responsibilities.
PDF

Offensive Security Overview

This provides an overview of the Offensive Component and the teams that commonly fall within this component as well as the associated responsibilities.
PDF

Penetration Testing Overview

This provides an overview of what a Penetration Test is, general guidance and the teams responsible for executing such.

Ad-Hoc Items

 

Artifact_Type

Title

Description

PDF

Foreclosure Scammers

This provides an overview of what to be on the lookout when someone tries to scam individuals going through a foreclosure process.