CyberSecurity-Topics
Application Development Policy - Vulnerability Management Application Development Separation of Test/Production Environments – Appropriate requirements...
Tue, 12 Jul, 2022 at 12:14 PM
Change Management policy - Application Security Scope Change Management Changes to information resources shall be managed and executed according to a f...
Tue, 12 Jul, 2022 at 12:29 PM
Inventory and Accountability Policy - Application Security Scope Assets Inventory of Assets – The organization will inventory and track all assets, phy...
Tue, 12 Jul, 2022 at 1:11 PM
Disaster Recovery and Business Continuity Policy - Business Enablement Disaster Recovery Development and Implementation – Management will develop and i...
Tue, 12 Jul, 2022 at 2:22 PM
Security Awareness Training - Security Operations Center(SOC) Purpose Establishing and maintaining information-security awareness through a security awar...
Tue, 12 Jul, 2022 at 2:11 PM
Organizational Competency - Governance Purpose Organizational competencies are the competencies needed in the organization so that it can excel and r...
Tue, 12 Jul, 2022 at 2:47 PM
File integrity monitoring (FIM) is an IT security procedure and technology that monitors and examines operating system (OS), database, and application softw...
Tue, 12 Jul, 2022 at 4:23 PM
A web application firewall (WAF) is a type of firewall that monitors, filters, and blocks data packets as they pass between a website and a web application....
Tue, 12 Jul, 2022 at 5:55 PM
Employee Handbook Agreement - Security Operations Center(SOC) Shift management in a security operations center (SOC) is the process of scheduling, m...
Tue, 12 Jul, 2022 at 11:01 PM
Network Protection Policy - Data Centric Approach Data masking is the process of transforming data in order to protect it from unauthorized access. ...
Tue, 12 Jul, 2022 at 11:28 PM