CyberAdeptness LLC

CyberAdeptness LLC
Resources
Artifact_Type Title/Link Description
PDF CyberAdeptness Blog Site Incorporates news on standards and blogs related to Enterprise Risk Management(ERM), Cloud Computing, System Security Engineering, and updates from NIST, ENISA, GDPR, and FedRAMP. [In Progress]
PDF NIST 800-171:Handling Controlled Unclassified Data Summary This provides a summary structured in an easy to read manner of NIST 800-171 publication addressing how Unclassified Data is to be handled by Gov Contractors levering 3rd Party Service Providers and/or Internal Resources to handle government data.

Small Business Security Services Overview

 
Artifact_Type Title Description
PDF Tax Consultants Overview This presentation provides an overview of key security requirements delineated by the Internal Revenue Service(IRS) to be followed by all individuals processing tax documentation.
PDF Real Estate Realtors Overview This presentation provides an overview of key security requirements currently under developmet for Real Estate based businesses and what Realtors must do to comply with the upcoming requirements.

Enterprise Risk Management (ERM)

 
Artifact_Type Title Description
PDF ERM Assessment Overview This presentation provides a high level overview on how the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) functions and the importance of an Enterprise Assessment.
PDF ERM Tier 1: Organization Overview This presentation provides an overview of the NIST ERM Framework Tier 1: Organization and its importance as part of an Enterprise Level Assessment.
PDF ERM Tier 2: Mission/Business Objective Overview This presentation provides an overview of the NIST ERM Framework Tier 2: Mission/Business Objectives and its importance as part of an Enterprise Level Assessment.
PDF ERM Tier 3: Infomation Systems Overview This presentation provides an overview of the NIST ERM Framework Tier 3: Information System and its importance as part of an Enterprise Level Assessment.
PDF Security Accreditation Assessments Overview This presentation provides an overview on how the Security Assessment Process functions and what is required prior to undergoing an assessment.

Cloud Computing

 
Artifact_Type Title Description
PDF Cloud In A Nutshell This presentation provides a high level overview of all the key items noted below with minimun details.
PDF Cloud Overview This presentation provides a high level overview on the history of Virtualization Technology and how it evolved into a solution for Cloud Computing.
PDF Cloud Deployment Types This presentation provides a high level overview of the four (4) cloud deployments strategies.
PDF Cloud Key Players aka Actors This presentation provides a high level overview of the typical Cloud Actors and their respective role within a cloud environment.
PDF Infrastructure As A Service (IaaS) Model This presentation provides an overview of the Infrastructure As A Service (IaaS) Cloud Model and some of the security concerns that the consumer and/or future service provider must consider.
PDF Platform As A Service (PaaS) Model This presentation provides an overview of the Platform As A Service (IaaS) Cloud Model and some of the security concerns that the consumer and/or future service provider must consider.
PDF Software As A Service (SaaS) Model This presentation provides an overview of the Software As A Service (IaaS) Cloud Model and some of the security concerns that the consumer and/or future service provider must consider.
PDF Container As A Service (CaaS) Model This presentation provides an overview of the Container As A Service (IaaS) Cloud Model and some of the security concerns that the consumer and/or future service provider must consider.

CyberSecurity

 
Artifact_Type Title Description
PDF Summary of NIST CyberSecurity Framework v1.1 This presentations summarizes the NIST Cybersecurity Framework in a easy to follow format.
PDF Summary of NIST CyberSecurity Framework v1.1 Controls Spreadsheet This spreadsheets provides a breakdowns of the security controls required and applicable to the NIST CyberSecurity Framework v1.1
PDF Cybersecurity Overview This provides an overview on how ERM and Cybersecurity must be integrated to function properly as part of the BIG Picture to ensure organizations lower cyber-attacks while understanding the unique risks tied to their organization.
PDF Defensive Security Overview This provides an overview of the Defensive Component and the teams that commonly fall within this component as well as the associated responsibilities.
PDF Offensive Security Overview This provides an overview of the Offensive Component and the teams that commonly fall within this component as well as the associated responsibilities.
PDF Penetration Testing Overview This provides an overview of what a Penetration Test is, general guidance and the teams responsible for executing such.

Ad-Hoc Items

 
Artifact_Type Title Description
PDF Foreclosure Scammers This provides an overview of what to be on the lookout when someone tries to scam individuals going through a foreclosure process.
PDF COVID19 Overview This provides an overview of COVID19 and associated Coronaviruses with guidance based on research.