Tuesday, August 28 2018

Community Cloud Deployment

This blog provides an overview of a Community Cloud Deployment.

Continue reading...

Private Cloud Deployment

This blog provides an overview of the Private Cloud Deployment option.

Continue reading...

Public Cloud Deployment

This blog provides an overview of the Public Cloud Deployment.

Continue reading...

Sunday, August 26 2018

High Level Overview of Cloud Security Standards

This provides an overview of how Cloud Security Standards evolved throughout the years since cloud computing was introduced as a viable option for organizations to deploy their systems while minimizing their resources and security responsibilities.

Continue reading...

Cloud Essentials

This blog provides a general overview on the architecture of a cloud environment.

Continue reading...

Saturday, August 25 2018

Serverless Infrastructure

This blog provides an overview of the Serverless model and general questions and answers about the technology leveraged.

Continue reading...

Friday, August 24 2018

Software as a Service (SaaS)

This blog provides an overview of the Software As A Service (SaaS) model and an overview of the responsibilities the Cloud Service Provider (CSP) addresses from a security perspective.

Continue reading...

Thursday, August 23 2018

Platform As A Service (PaaS)

This blog provides an overview of the Platform As A Service (PaaS) model and an overview of the responsibilities the Cloud Service Provider (CSP) addresses from a security perspective.

Continue reading...

Wednesday, August 22 2018

Infrastructure As A Service (IaaS)

This blog provides an overview of the Infrastructure As A Service (IaaS) model and an overview of the responsibilities the Cloud Service Provider (CSP) addresses from a security perspective.

Continue reading...

Tuesday, August 21 2018

Cloud Computing- What lead to such concept?

This blog provides an overview of what cloud computing is and how it came to be what we know today.

Continue reading...

Monday, August 20 2018

Cybersecurity's Framework Tiers

This blog provides a summary of the Tiers delineated on the Cybersecurity Framework.

Continue reading...

Cybersecurity's Framework Core Elements and Components

This blog summarizes the 1st portion of the Cybersecurity Framework.. it's CORE processes.

Continue reading...

Thursday, August 16 2018

Tier 2: Artifacts

This blog provides an overview on the artifacts that are generated as a result of Tier's 2 assessment. Keep in mind that the assessment and the artifacts are separate.

Continue reading...

IMPORTANCE of Tier 2: Mission and Business Processes

This blog provides details on the importance of NIST RMF Tier 2 and how is works in conjunction with Tier 1 & Tier 3.

Continue reading...

Thursday, August 9 2018

Tier 1: Roles and Responsibilities

This blog provides a high level overview of the roles and responsibilities associated with Tier 1.

Continue reading...

Monday, August 6 2018

Tier 1: Additional Artifacts Generated

The Tier 1 Assessment is essential to delineate a set of documents required for a successful implementation of an Enterprise Level Risk Management. This blog provides a general overview of the artifacts. Please note, the final determination of artifacts required depends on the organization needs, which is unique in nature for each organization. No outcome is the same.

Continue reading...

Monday, July 30 2018

Tier 1: Investment Strategy

Investment Strategy is one of the most important task of Tier 1. In this blog, we will provide some details on how Risk Management can have an impact on the organization's Investment Strategy and what items should be considered when delineating the strategy.

Continue reading...

Thursday, July 19 2018

IMPORTANCE of Tier 1: Organization (Governance)

This provides an overview on the importance of Tier 1 as it pertains to an Enterprise Level Risk Management Framework.

Continue reading...

Monday, July 16 2018

NIST Risk Management Framework Evolution

This blog delineates an overview of the National Institute of Standards and Technology (NIST) Risk Management Evolution in the past 16 years since it was first published in 2002. 

Continue reading...

NIST Cybersecurity Framework Overview

This blog provides an overview of the current NIST Cybersecurity Framework and how integrates into the NIST Risk Management Framework. The framework itself is a risk-based approach to managing cybersecurity risks, and is composed of three parts: The Framework Core, the Framework Implementation Tiers, and the Framework Profiles. 

Continue reading...

page 2 of 2 -