Certification | Physical Security Professional | link | Complete | 20220108 |
Conference | NWCUA - Incident Response Tabletop Exercise | N/A | Complete | 20180522, 240 minutes |
Demo | Black Kite product demo | N/A | Complete | 20220420, 25 minutes |
Group | DC541 (DefCon affiliate) | N/A | Complete | 20180109, 120 minutes |
Group | DC541 (DefCon affiliate) | N/A | Complete | 20180210, 120 minutes |
Group | DC541 (DefCon affiliate) | N/A | Complete | 20180310, 120 minutes |
Group | DC541 (DefCon affiliate) | N/A | Complete | 20180609, 120 minutes |
Group | DC541 (DefCon affiliate) | N/A | Complete | 20180721, 60 minutes |
Group | DC541 (DefCon affiliate) | N/A | Complete | 20180908, 120 minutes |
Group | DC541 (DefCon affiliate) | N/A | Complete | 20181110, 120 minutes |
Group | DC541 (DefCon affiliate) | N/A | Complete | 20190209, 90 minutes |
Lecture | Cyber War is Still Not Taking Place, delivered to DC541 | N/A | Complete | 20180310, 15 minutes |
NIST SP | NIST SP 800-100 Information Security Handbook: A Guide for Managers | Pending | Pending | Pending |
NIST SP | NIST SP 800-101 Rev. 1 Guidelines on Mobile Device Forensics | Pending | Pending | Pending |
NIST SP | NIST SP 800-114 Rev. 1 User's Guide to Telework and Bring Your Own Device (BYOD) Security | Pending | Pending | Pending |
NIST SP | NIST SP 800-115 Technical Guide to Information Security Testing and Assessment | Pending | Pending | Pending |
NIST SP | NIST SP 800-121 Rev. 2 Guide to Bluetooth Security | Pending | Pending | Pending |
NIST SP | NIST SP 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) | Pending | Pending | Pending |
NIST SP | NIST SP 800-123 Guide to General Server Security | Pending | Pending | Pending |
NIST SP | NIST SP 800-124 Rev. 1 Guidelines for Managing the Security of Mobile Devices in the Enterprise | Pending | Pending | Pending |
NIST SP | NIST SP 800-125 Guide to Security for Full Virtualization Technologies | Pending | Pending | Pending |
NIST SP | NIST SP 800-125B Secure Virtual Network Configuration for Virtual Machine (VM) Protection | Pending | Pending | Pending |
NIST SP | NIST SP 800-137 Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations | Pending | Pending | Pending |
NIST SP | NIST SP 800-144 Guidelines on Security and Privacy in Public Cloud Computing | Pending | Pending | Pending |
NIST SP | NIST SP 800-145 The NIST Definition of Cloud Computing | Pending | Pending | Pending |
NIST SP | NIST SP 800-146 Cloud Computing Synopsis and Recommendations | Pending | Pending | Pending |
NIST SP | NIST SP 800-150 Guide to Cyber Threat Information Sharing | Pending | Pending | Pending |
NIST SP | NIST SP 800-153 Guidelines for Securing Wireless Local Area Networks (WLANs) | Pending | Pending | Pending |
NIST SP | NIST SP 800-160 Vol. 2 Developing Cyber Resilient Systems: A Systems Security Engineering Approach | Pending | Pending | Pending |
NIST SP | NIST SP 800-161 Supply Chain Risk Management Practices for Federal Information Systems and Organizations | link | Complete | 20200326, 180 minutes |
NIST SP | NIST SP 800-163 Rev. 1 Vetting the Security of Mobile Applications | Pending | Pending | Pending |
NIST SP | NIST SP 800-167 Guide to Application Whitelisting | Pending | Pending | Pending |
NIST SP | NIST SP 800-171 Guide to Integrating Forensic Techniques into Incident Response | link | Complete | 20180831, 30 minutes |
NIST SP | NIST SP 800-171 Rev. 2 Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations | Pending | Pending | Pending |
NIST SP | NIST SP 800-171A Assessing Security Requirements for Controlled Unclassified Information | Pending | Pending | Pending |
NIST SP | NIST SP 800-171B Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations: Enhanced Security Requirements for Critical Programs and High Value Assets | Pending | Pending | Pending |
NIST SP | NIST SP 800-177 Rev. 1 Trustworthy Email | Pending | Pending | Pending |
NIST SP | NIST SP 800-181 National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework | link | Pending | Pending |
NIST SP | NIST SP 800-28 Version 2 Guidelines on Active Content and Mobile Code | Pending | Pending | Pending |
NIST SP | NIST SP 800-34 Rev. 1 Contingency Planning Guide for Federal Information Systems | Pending | Pending | Pending |
NIST SP | NIST SP 800-39 Managing Information Security Risk: Organization, Mission, and Information System View | Pending | Pending | Pending |
NIST SP | NIST SP 800-40 Rev. 3 Guide to Enterprise Patch Management Technologies | Pending | Pending | Pending |
NIST SP | NIST SP 800-41 Rev. 1 Guidelines on Firewalls and Firewall Policy | Pending | Pending | Pending |
NIST SP | NIST SP 800-44 Version 2 Guidelines on Securing Public Web Servers | Pending | Pending | Pending |
NIST SP | NIST SP 800-45 Version 2 Guidelines on Electronic Mail Security | Pending | Pending | Pending |
NIST SP | NIST SP 800-46 Rev. 2 Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security | Pending | Pending | Pending |
NIST SP | NIST SP 800-47 Security Guide for Interconnecting Information Technology Systems | Pending | Pending | Pending |
NIST SP | NIST SP 800-50 Building an Information Technology Security Awareness and Training Program | Pending | Pending | Pending |
NIST SP | NIST SP 800-52 Rev. 2 Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations | Pending | Pending | Pending |
NIST SP | NIST SP 800-55 Rev. 1 Performance Measurement Guide for Information Security | Pending | Pending | Pending |
NIST SP | NIST SP 800-58 Security Considerations for Voice Over IP Systems | Pending | Pending | Pending |
NIST SP | NIST SP 800-61 Computer Security Incident Handling Guide | link | Pending | Pending |
NIST SP | NIST SP 800-61 Rev. 2 Computer Security Incident Handling Guide | link | Pending | Pending |
NIST SP | NIST SP 800-66 Rev. 1 An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule | Pending | Pending | Pending |
NIST SP | NIST SP 800-81-2 Secure Domain Name System (DNS) Deployment Guide | Pending | Pending | Pending |
NIST SP | NIST SP 800-83 Guide to Malware Incident Prevention and Handling for Desktops and Latptops | link | Pending | Pending |
NIST SP | NIST SP 800-83 Rev. 1 Guide to Malware Incident Prevention and Handling for Desktops and Laptops | Pending | Pending | Pending |
NIST SP | NIST SP 800-86 Guide to Integrating Forensic Techniques into Incident Response | link | Pending | Pending |
NIST SP | NIST SP 800-88 Rev. 1 Guidelines for Media Sanitization | Pending | Pending | Pending |
NIST SP | NIST SP 800-92 Guide to Computer Security Log Management | Pending | Pending | Pending |
NIST SP | NIST SP 800-94 Rev. 1 Guide to Intrusion Detection and Prevention Systems (IDPS) | Pending | Pending | Pending |
NIST SP | NIST SP 800-95 Guide to Secure Web Services | Pending | Pending | Pending |
NIST SP | NIST SP 1800-11 Data Integrity: Recovering from Ransomware and Other Destructive Events | link | Complete | 20230323 |
NIST SP | NIST SP 1800-16 Securing Web Transactions: TLS Server Certificate Management | link | Complete | 20230323 |
Other | 2015–2016 SWIFT banking hack | link | Pending | Pending |
Other | IFAP Electronic Announcements | link | Pending | Pending |
Other | Significant Cyber Incidents | link | Pending | Pending |
Other | Wikipedia: Office of Personnel Management data breach | link | Pending | Pending |
Podcast | [CORRECTED] Risky Business feature: A podcast on Bloomberg's absolutely wild Supermicro story | link | Pending | Pending |
Podcast | ASIS 2017: Dallas Preview | link | Pending | Pending |
Podcast | BBC Inquiry: What’s so scary about Huawei? | link | Complete | 20190200, 23 minutes |
Podcast | BONUS: Behavioral Responses to Terror, extended | link | Complete | 20180123, 15 minutes |
Podcast | BONUS: Behavioral Responses to Terror, extended | link | Pending | Pending |
Podcast | CSIS: Collateral Damage? Research Collaboration in an Age of U.S.-China Competition | link | Complete | 20190600, 119 minutes |
Podcast | CSIS: Dead Cows, Oxblood and Other Cyber Vigilantes: A History of Hacktivism | link | Complete | 20190711, 42 minutes |
Podcast | CSIS: The Real Costs of Huawei Technology: A Conversation with James Lewis | link | Complete | 20190628, 25 minutes |
Podcast | DtSR Episode 268 - CISOs Survival Guide | link | Complete | 20171221, 55 minutes |
Podcast | DtSR Episode 274 - Let's Talk Power Grid | link | Complete | 20180207, 39 minutes |
Podcast | DtSR Episode 317 - Protecting Higher Education | link | Complete | 20190102, 39 minutes |
Podcast | DtSR Episode 318 - War, Cyber and Policy | link | Pending | Pending |
Podcast | DtSR Episode 319 - Striking Out On Your Own | link | Pending | Pending |
Podcast | DtSR Episode 320 - Specializing in Forensics | link | Pending | Pending |
Podcast | DtSR Episode 371 - Advancing SOC-as-a-Service | link | Complete | 20191100, 38 minutes |
Podcast | FP's First Person: How Citizen Journalists Solved the Mystery of Malaysia Airlines Flight 17 | link | Complete | 20190300, 28 minutes |
Podcast | Hackable?: Access Granted | link | Complete | 20180207, 39 minutes |
Podcast | Hackable?: Darknet Diaries Presents: Project Raven | link | Complete | 20191000, 62 minutes |
Podcast | Hackable?: Face the Fax | link | Complete | 20190700, 27 minutes |
Podcast | Hackable?: The Mr. Robot Spectacular | link | Complete | 20190800, 34 minutes |
Podcast | Hoover Institution: Ex-Facebook security head Alex Stamos on cybersecurity, elections, and the Internet of Things | link | Complete | 20181222, 27 minutes |
Podcast | King's College London War Studies Podcast: Event: Cyber Strategy: The Evolution of Cyber Power and Coercion | link | Complete | 20180514, 52 minutes |
Podcast | Planet Money #825: Who Started The Wildfire? | link | Complete | 20190200, 21 minutes |
Podcast | Planet Money #931: The IT Guy Vs. The Con Artist | link | Complete | 20190900, 22 minutes |
Podcast | Professor Messer's Network+ Study Group - January 2017 | link | Complete | 20191011, 68 minutes |
Podcast | Risky Biz Snake Oilers #2: Part 1: Crowdstrike, AttackIQ and Replicated explain their tech | link | Complete | 20171219, 39 minutes |
Podcast | Risky Biz Snake Oilers #2: Part 2: Authentication tech from Yubico and Remediant | link | Complete | 20171220, 27 minutes |
Podcast | Risky Biz Soap Box: Bugcrowd founder and CEO Casey Ellis on the future of crowdsourced security | link | Complete | 20171208, 32 minutes |
Podcast | Risky Biz Soap Box: Exploit kits are dead, at-scale social engineering the new black | link | Complete | 20171206, 40 minutes |
Podcast | Risky Biz Soap Box: Keep your vendors honest with attack simulation | link | Complete | 20171207, 32 minutes |
Podcast | Risky Business #459 -- Actually yes, "cyber war" is real for Ukraine | link | Complete | 20171109, 61 minutes |
Podcast | Risky Business #460 -- Haroon Meer talks Kaspersky drama, NotPetya, the cryptowars and more | link | Complete | 20171110, 44 minutes |
Podcast | Risky Business #461 -- AWS security with Atlassian's Daniel Grzelak | link | Complete | 20171113, 59 minutes |
Podcast | Risky Business #462 -- Does the Australian government want to break encryption? | link | Complete | 20171114, 56 minutes |
Podcast | Risky Business #463 -- Black Hat's 2017 keynote speaker Alex Stamos joins the show | link | Complete | 20171115, 63 minutes |
Podcast | Risky Business #464 -- Why your game theory theories are wrong | link | Complete | 20171117, 50 minutes |
Podcast | Risky Business #465 -- Charlie Miller on autonomous car security | link | Complete | 20171120, 60 minutes |
Podcast | Risky Business #466 -- Breaking reverse proxies shouldn't be this easy | link | Complete | 20171121, 56 minutes |
Podcast | Risky Business #467 -- HPKP as an attack vector | link | Complete | 20171121, 39 minutes |
Podcast | Risky Business #468 -- Marcus Hutchins gets "Krebsed," the ICO bubble and more | link | Complete | 20171122, 54 minutes |
Podcast | Risky Business #469 -- More like EquiHAX. AMIRITE?? | link | Complete | 20171124, 47 minutes |
Podcast | Risky Business #470 -- Project Zero's Natalie Silvanovich on reducing attack surface | link | Complete | 20171127, 60 minutes |
Podcast | Risky Business #471 -- Good Microsoft, bad Microsoft | link | Complete | 20171128, 54 minutes |
Podcast | Risky Business #472 -- Iran DDoSed banks in 2012, US DoSed DPRK | link | Complete | 20171129, 50 minutes |
Podcast | Risky Business #473 -- Kaspersky is officially toast | link | Complete | 20171130, 52 minutes |
Podcast | Risky Business #474 -- Inside new, "invisible" Rowhammer attacks | link | Complete | 20171201, 65 minutes |
Podcast | Risky Business #475 -- Matt Tait: US gov needs to put up or shut up on Kaspersky claims | link | Complete | 20171204, 64 minutes |
Podcast | Risky Business #476 -- Zeynep Tufekci on machine learning and disinformation | link | Complete | 20171205, 61 minutes |
Podcast | Risky Business #477 -- US mulls charges against Russian officials involved in DNC hack | link | Complete | 20171211, 42 minutes |
Podcast | Risky Business #478 -- Why a "Digital Geneva Convention" won't work | link | Complete | 20171212, 67 minutes |
Podcast | Risky Business #479 -- Oh, Uber. Oh, Apple. | link | Complete | 20171213, 62 minutes |
Podcast | Risky Business #480 -- Uber, Kaspersky woes continue | link | Complete | 20171214, 55 minutes |
Podcast | Risky Business #481 -- Inside the Anthem breach with someone who was there | link | Complete | 20180102, 72 minutes |
Podcast | Risky Business #482 -- Meltdown and Spectre coverage without the flappy arms | link | Complete | 20180130, 66 minutes |
Podcast | Risky Business #483 -- Internet censorship in Iran, China | link | Complete | 20180201, 62 minutes |
Podcast | Risky Business #484 -- What's up with the new 702? | link | Complete | 20180205, 64 minutes |
Podcast | Risky Business #485 -- Infosec startups overfunded, good exits unlikely | link | Complete | 20180501, 55 minutes |
Podcast | Risky Business #486 -- Locking down AWS permissions with RepoKid | link | Complete | 20180504, 55 minutes |
Podcast | Risky Business #487 -- Guest Katie Moussouris on her recent Senate Subcommittee testimony | link | Complete | 20180514, 57 minutes |
Podcast | Risky Business #488 -- Stop users recycling passwords with the pwned passwords API | link | Complete | 20180515, 55 minutes |
Podcast | Risky Business #489 -- (Deep) Fake News | link | Complete | 20180516, 54 minutes |
Podcast | Risky Business #490 -- North Korea, 'cyber norms' and diplomacy | link | Complete | 20180521, 51 minutes |
Podcast | Risky Business #491 -- The biggest infosec news week we've ever seen | link | Complete | 20180612, 53 minutes |
Podcast | Risky Business #492 -- Thomas Rid on sloppy active measures | link | Complete | 20180613, 61 minutes |
Podcast | Risky Business #493 -- SWIFT, pipeline attacks, Chrome's AV feature and more | link | Complete | 20180614, 44 minutes |
Podcast | Risky Business #494 -- Cisco customers have a bad week, plus a deep dive on WebAuthn | link | Complete | 20180709, 41 minutes |
Podcast | Risky Business #495 -- Russian Internet users are having a bad time | link | Complete | 20180710, 47 minutes |
Podcast | Risky Business #496 -- The China supply chain problem | link | Complete | 20180723, 61 minutes |
Podcast | Risky Business #497 -- Silvio's greatest hits | link | Complete | 20180904, 56 minutes |
Podcast | Risky Business #498 -- There sure is a lot of Microsoft Defender out there these days | link | Pending | Pending |
Podcast | Risky Business #499 -- Is PGP actually busted and Signal pwnt? Noooope | link | Complete | 20180823, 73 minutes |
Podcast | Risky Business #500 -- Web asset discovery is getting useful | link | Complete | 20190611, 60 minutes |
Podcast | Risky Business #501 -- Trisis: signalling, deterrence or escalation? | link | Complete | 20190612, 48 minutes |
Podcast | Risky Business #502 -- Inside China's hacker scene | link | Complete | 20190613, 62 minutes |
Podcast | Risky Business #503 -- North Korean tech in the global supply chain | link | Complete | 20190701, 62 minutes |
Podcast | Risky Business #504 -- Latest email frauds and changes to money muling | link | Complete | 20190702, 57 minutes |
Podcast | Risky Business #505 -- Sanger vs FireEye, Reality Winner cops a plea | link | Complete | 20190703, 45 minutes |
Podcast | Risky Business #506 -- How security teams can work with PR | link | Complete | 20190709, 59 minutes |
Podcast | Risky Business #507 -- For Vlad | link | Complete | 20190716, 56 minutes |
Podcast | Risky Business #508 -- Special guest Greg Shipley of In-Q-Tel's Cyber Reboot | link | Pending | Pending |
Podcast | Risky Business #509 -- Just the usual mayhem and ownage | link | Pending | Pending |
Podcast | Risky Business #510 -- Hacky hack hack | link | Pending | Pending |
Podcast | Risky Business #511 -- Australia, Japan to ban Huawei, Struts drama, DNC lols and more | link | Pending | Pending |
Podcast | Risky Business #512 -- Five Eyes nations send clear message on encryption | link | Pending | Pending |
Podcast | Risky Business #513 -- The DPRK indictment, BA gets owned, Webauthn issues and more [CORRECTED] | link | Pending | Pending |
Podcast | Risky Business #514 -- New NSO Group report released and another State Department email breach. Drink! | link | Pending | Pending |
Podcast | Risky Business #515 -- NSA staffer at centre of Kaspersky scandal jailed | link | Pending | Pending |
Podcast | Risky Business #516 -- The Facebook breach, e2e VOIP court verdict, Uber's record fine and more | link | Pending | Pending |
Podcast | Risky Business #517 -- Bloomberg's dumpster fire lights up infosec | link | Pending | Pending |
Podcast | Risky Business #518 -- "Russian Cambridge Analytica" booted off Facebook after token hack | link | Pending | Pending |
Podcast | Risky Business #519 -- '90s IRC war between US and Russia intensifies | link | Pending | Pending |
Podcast | Risky Business #520 -- Tanya Janca talks security in the curriculum | link | Pending | Pending |
Podcast | Risky Business #521 -- Bears everywhere | link | Pending | Pending |
Podcast | Risky Business #522 -- Alex Stamos co-hosts the show, reflects on Snowden disclosures | link | Pending | Pending |
Podcast | Risky Business #523 -- So many breaches | link | Pending | Pending |
Podcast | Risky Business #524 -- Huawei CFO arrested, US Government dumps on Equifax | link | Pending | Pending |
Podcast | Risky Business #525 -- Back on deck for 2019! | link | Pending | Pending |
Podcast | Risky Business #526 -- Huawei arrest in Poland, DPRK SWIFT hack conviction, more from the El Chapo trial | link | Pending | Pending |
Podcast | Risky Business #527 -- Featuring Alex Stamos, The Grugq, Susan Hennessey, Brian Krebs, Kelly Shortridge and Bobby Chesney | link | Pending | Pending |
Podcast | Risky Business #528 -- Huawei dinged, epic FaceTime and Exchange bugs | link | Pending | Pending |
Podcast | Risky Business #529 -- Special guest Rob Joyce, NSA | link | Pending | Pending |
Podcast | Risky Business #530 -- UAE's Project Raven, Bezosgate and more | link | Pending | Pending |
Podcast | Risky Business #531 -- Australia's political parties targeted, the Witt indictment and more | link | Pending | Pending |
Podcast | Risky Business #532 -- A big week of research and tech news | link | Pending | Pending |
Podcast | Risky Business #533 -- Ghidra release, NSA discontinues metadata program and more | link | Pending | Pending |
Podcast | Risky Business #534 -- Manning back in clink, automotive industry under attack | link | Pending | Pending |
Podcast | Risky Business #535 -- Stop giving Cloudflare money | link | Pending | Pending |
Podcast | Risky Business #536 -- Mar-a-Lago arrest, ASUS supply chain attack and more | link | Pending | Pending |
Podcast | Risky Business #537 -- Assange arrested, WordPress ecosystem on fire | link | Pending | Pending |
Podcast | Risky Business #538 -- Marcus Hutchins is a milkshake duck, Iranian APTs doxxed and more | link | Pending | Pending |
Podcast | Risky Business #539 -- Docker Hub owned, Cloudflare, Bloomberg under fire | link | Pending | Pending |
Podcast | Risky Business #541 -- NSO Group makes global headlines. What next? | link | Pending | Pending |
Podcast | Risky Business #542 -- Confusion reigns over Huawei ban | link | Pending | Pending |
Podcast | Risky Business #543 -- NYTimes blames NSA for Baltimore hacks, Assange faces espionage charges | link | Pending | Pending |
Podcast | Risky Business #544 -- NYTimes Baltimore report falls over | link | Pending | Pending |
Podcast | Risky Business #551 -- Post Vegas edition, more news than we can handle | link | Complete | 20191011, 73 minutes |
Podcast | Risky Business #567 -- ToTok, Iran and big-game ransomware galore | link | Complete | 20200131, 79 minutes |
Podcast | Risky Business #568 -- Let's Decrypt | link | Complete | 20200203, 55 minutes |
Podcast | Risky Business #569 -- Bezos' Saudi hack claims, Glenn Greenwald facing cybercrime charges | link | Complete | 20200203, 50 minutes |
Podcast | Risky Business #570 -- FTI report lands like a lead balloon | link | Complete | 20200214, 64 minutes |
Podcast | Risky Business #571 -- Is Joshua Schulte The Shadow Brokers? | link | Complete | 20200214, 65 minutes |
Podcast | Risky Business #572 -- Equifax indictments land, some big Huawei news | link | Complete | 20200224, 66 minutes |
Podcast | Risky Business #613 -- It's time to check your Accellion logs | link | Complete | 20210203, 50 minutes |
Podcast | Risky Business #614 -- So was it Florida Man or an Iranian APT? | link | Complete | 20210210, 56 minutes |
Podcast | Risky Business Feature podcast: Alexa O'Brien on Wikileaks, intelligence and influence | link | Complete | 20200213, 45 minutes |
Podcast | Risky Business #615 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #616 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #617 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #618 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #619 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #620 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #621 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #622 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #623 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #624 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #625 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #626 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #627 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #628 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #629 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #630 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #631 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #632 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #633 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #634 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #635 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #636 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #637 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #638 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #639 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #640 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #641 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #642 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #643 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #644 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #645 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #646 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #647 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #648 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #649 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #650 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #651 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #652 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #653 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #654 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #655 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #656 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #657 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #658 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #659 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #660 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #661 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #662 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #663 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #664 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #665 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #666 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #667 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #668 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #669 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #670 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #671 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #672 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #673 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #674 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #675 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #676 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #677 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #678 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #679 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #680 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #681 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #682 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #683 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #684 | link | Complete | Timeframe lost; 1 hour |
Podcast | Risky Business #685 -- Australia releases the hounds, and it might just work | link | Complete | 20221119, 63 minutes |
Podcast | Risky Business #686 -- White House to move on spyware industry | link | Complete | 20221124, 59 minutes |
Podcast | Risky Business #687 -- Shady deeds in sunny places: Ransomware smashes Vanuatu, Guadeloupe | link | Complete | 20221201, 54 minutes |
Podcast | Risky Business #688 -- APT41 pickpockets Uncle Sam | link | Complete | 20221208, 63 minutes |
Podcast | Risky Business #689 -- FBI baulks at Apple's iCloud encryption push | link | Complete | 20221215, 56 minutes |
Podcast | Risky Business #690 -- 2023 will be a rough year for critical online services | link | Complete | 20230112, 69 minutes |
Podcast | Risky Business #691 -- LockBit and "Pablo Escobar syndrome" | link | Complete | 20230119, 57 minutes |
Podcast | Risky Business #692 -- Google search results spew malware, phishing sites | link | Complete | 20230126, 66 minutes |
Podcast | Risky Business #693 -- Hive takedown is the beginning, not the end | link | Complete | 20230202, 54 minutes |
Podcast | Risky Business #694 -- Cleansing fire claims ESXi, GoAnywhere servers | link | Complete | 20230209, 52 minutes |
Podcast | Risky Business #695 -- North Korea is ransomwaring hospitals, Russia to make "patriotic" hacking legal | link | Complete | 20230216, 60 minutes |
Podcast | Risky Business #696 -- Why Twitter had to kill SMS 2FA | link | Complete | 20230223, 63 minutes |
Podcast | Risky Business #697 -- LastPass attacker: Do you gotta hand it to 'em? | link | Complete | 20230302, 59 minutes |
Podcast | Risky Business #698 -- Why LastPass was probably DPRK* | link | Complete | 20230309, 61 minutes |
Podcast | Risky Business #699 -- BYOD risks ramp up | link | Complete | 20230315, 60 minutes |
Podcast | Risky Business #700 -- Yevgeny Prigozhin's empire gets owned | link | Complete | 20230328, 58 minutes |
Podcast | Risky Business #701 -- Why infosec is wrong about TikTok | link | Complete | 20230303, 59 minutes |
Podcast | Risky Business #702 -- 3CX: It's like SolarWinds, but stupider | link | Complete | 20230419, 61 minutes |
Podcast | Risky Business #703 -- Russia whines about its tech dependence on China | link | Complete | 20230501, 56 minutes |
Podcast | Risky Business #704 -- Why LLMs aren't an exploit bonanza | link | Complete | 20230503, 64 minutes |
Podcast | Risky Business #705 -- USA's Turla takedown marks a shift in tactics | link | Complete | 20230510, 54 minutes |
Podcast | Risky Business #706 -- Why BlackBerry thinks Cuba ransomware is a Russian front | link | Complete | 20230517, 64 minutes |
Podcast | Risky Business #707 -- Inside China's information lockdown with Chris Krebs | link | Complete | 20230524, 58 minutes |
Podcast | Risky Business #708 – China's lolbin-powered adventures in US critical infrastructure | link | Complete | 20230602, 53 minutes |
Podcast | Risky Business #709 -- Cl0p goes berserk with MOVEit 0day | link | Complete | 20230609, 56 minutes |
Podcast | Risky Business #710 -- Why your corporate VPN will get you owned | link | Complete | 20230622, 62 minutes |
Podcast | Risky Business #711 -- Albanian authorities raid MEK camp over Iran hacks | link | Complete | 20230627, 59 minutes |
Podcast | Risky Business #712 -- The 336,000 undead Fortigates of DOOM | link | Complete | 20230815, 69 minutes |
Podcast | Risky Business #713 -- Microsoft activates PR weasels after State Department hack | link | Complete | 20230816, 59 minutes |
Podcast | Risky Business #714 -- Microsoft vs Wiz: pistols at dawn | link | Complete | 20230817, 62 minutes |
Podcast | Risky Business #715 -- Pressure mounts on Microsoft to explain itself | link | Complete | 20230821, 59 minutes |
Podcast | Risky Business #716 -- This ain't your grandma's cloud | link | Complete | 20230825, 56 minutes |
Podcast | Risky Business #717 -- The kids are okay. At ripping your face off. | link | Complete | 20230825, 61 minutes |
Podcast | Risky Business #718 -- Chaos and carnage, business as usual | link | Complete | 20230830, 51 minutes |
Podcast | Risky Business #719 -- FBI vapes 700,000 Qakbot infections | link | Complete | 20230901, 54 minutes |
Podcast | Risky Business #720 -- How cloud identity provider federation features can get you mega-owned | link | Complete | 20230906, 57 minutes |
Podcast | Risky Business #721 -- Why Storm-0558's Microsoft hack should have failed | link | Complete | 20230915, 58 minutes |
Podcast | Risky Business #722 -- Microsoft embraces Zero Trust... Authentication? | link | Complete | 20230923, 59 minutes |
Podcast | Risky Business #723 -- MGM and Caesars: Western youths are working with ransomware gangs | link | Complete | 20230929, 57 minutes |
Podcast | Risky Business #724 -- Exploitation moves away from Microsoft, Google and Apple products | link | Complete | 20231006, 55 minutes |
Podcast | Risky Business #725 -- Microsoft knifes VBScript, passkeys the new default for Google accounts | link | Complete | 20231013, 44 minutes |
Podcast | Risky Business: An interview with Andrew Boyd, director of the CIA's Centre for Cyber Intelligence | link | Complete | 20230224, 53 minutes |
Podcast | Risky Business: Between Two Nerds: Why we hate the term "cyberwar" | link | Complete | 20220829, 22 minutes |
Podcast | The CMMC Explained | link | Complete | 20211223, 43 minutes |
Podcast | Marti Arvin and Anthony Buenger on the CMMC Framework [Podcast] | link | Complete | 20211223, 15 minutes |
Podcast | An Introduction to CMMC Assessment Guides | link | Complete | 20211223, 8 minutes |
Podcast | The CMMC Level 1 Assessment Guide: A Closer Look | link | Complete | 20211223, 21 minutes |
Podcast | The CMMC Level 3 Assessment Guide: A Closer Look | link | Complete | 20211223, 14 minutes |
Podcast | Reviewing and Measuring Activities for Effectiveness in CMMC Level 4 | link | Complete | 20211223, 13 minutes |
Podcast | Optimizing Process Maturity in CMMC Level 5 | link | Complete | 20211223, 9 minutes |
Podcast | The Virtual CISO Podcast, Episode #1. CMMC: What You Need to Know About DoD Cybersecurity Regulation w/ Katie Arrington | link | Complete | 20211223, 61 minutes |
Podcast | The Lazarus Heist Episode: Introducing The Lazarus Heist | link | Complete | 20210801, 3 minutes |
Podcast | The Lazarus Heist Episode 1. Hacking Hollywood | link | Complete | 20210802, 34 minutes |
Podcast | The Lazarus Heist Episode 2. Disaster movie | link | Complete | 20210803, 37 minutes |
Podcast | The Lazarus Heist Episode 3. Superdollars | link | Complete | 20210804, 33 minutes |
Podcast | The Lazarus Heist Episode 4. Billion dollar hack | link | Complete | 20210805, 39 minutes |
Podcast | The Lazarus Heist Episode 5. Cyber warriors | link | Complete | 20210806, 42 minutes |
Podcast | The Lazarus Heist Episode 6. Cyber slaves | link | Complete | 20210807, 40 minutes |
Podcast | The Lazarus Heist Episode 7. Korean roulette | link | Complete | 20210808, 39 minutes |
Podcast | The Lazarus Heist Episode 8. The multimillion mistake | link | Complete | 20210809, 36 minutes |
Podcast | The Lazarus Heist Episode 9. The Macau connection | link | Complete | 20210810, 41 minutes |
Podcast | The Lazarus Heist Episode 10. Kill switch | link | Complete | 20210811, 45 minutes |
Podcast | The Lazarus Heist Episode: Update from Jean and Geoff | link | Complete | 20220717, 3 minutes |
Podcast | The Lazarus Heist Lazarus Heist live | link | Complete | 20220417, 58 minutes |
Podcast | The Lazarus Heist Season 2 trailer | link | Complete | 20220417, 3 minutes |
Podcast | The Lazarus Heist S2.1 Jackpotting | link | Complete | 20220418, 37 minutes |
Podcast | The Lazarus Heist S2.2 Big Boss | link | Complete | 20220419, 33 minutes |
Podcast | The Lazarus Heist S2.3 Hushpuppi | link | Complete | 20230420, 39 minutes |
Podcast | The Lazarus Heist S2.4 Fire and fury | link | Complete | 20230422, 44 minutes |
Podcast | The Lazarus Heist S2.5 ‘Olympic Destroyer’ | link | Complete | 20230424, 26 minutes |
Podcast | The Lazarus Heist S2.6 False flags | link | Complete | 20230501, 37 minutes |
Podcast | The Lazarus Heist S2.7 Crypto comrades | link | Complete | 2023//04//24 |
Podcast | The Lazarus Heist S2.8 Bitcoin bandits | link | Complete | 2023//05//01 |
Podcast | The Lazarus Heist S2.9 Big spenders | link | Complete | 2023//05//08 |
Podcast | Security Management Highlights December 2017 | link | Complete | 20180122, 24 minutes |
Podcast | Security Management Highlights January 2018 | link | Complete | 20180129, 19 minutes |
Podcast | Security Management Highlights July 2017 | link | Complete | 20180122, 23 minutes |
Podcast | Security Management Highlights July 2017 | link | Pending | Pending |
Podcast | Security Management Highlights November 2017 | link | Pending | Pending |
Podcast | Security Management Highlights October 2017 | link | Pending | Pending |
Podcast | Security Management Lightning Round August 2017 | link | Pending | Pending |
Podcast | Security Now #647: The Dark Caracal | link | Complete | 20180205, 109 minutes |
Podcast | SFS Episode 172 - Security Awareness Deep Dive | link | Pending | Pending |
Podcast | SFS Episode 173 - Vendor Relationships | link | Pending | Pending |
Podcast | SFS Episode 174 - Doing Threat Intelligence Smartly | link | Pending | Pending |
Podcast | SFS Episode 190 - Burnout | link | Pending | Pending |
Podcast | SFS Episode 191 - Gone Phishin' | link | Pending | Pending |
Podcast | SFS Episode 193 - Chief Information Security Oh-Crap | link | Pending | Pending |
Podcast | SFS Episode 194 - Evaluating Security Product Vendors | link | Pending | Pending |
Podcast | SFS Episode 197 - After the Penetration Test | link | Pending | Pending |
Podcast | SFS Episode 198 - Building a Security Strategy Part 1 | link | Pending | Pending |
Podcast | SFS Episode 199 - Building a Security Strategy Part 2 | link | Pending | Pending |
Podcast | SFS Episode 200 - Building a Security Strategy - Part III | link | Pending | Pending |
Podcast | SFS Episode 201 - Celebration | link | Pending | Pending |
Podcast | SFS Episode 208 - All Good Things... | link | Pending | Pending |
Podcast | The Guardian: A week in the life of 8chan: Chips with Everything podcast | link | Complete | 20190900, 24 minutes |
Podcast | The Guardian: Dark Patterns: the art of online deception – Science Weekly podcast | link | Complete | 20190700, 27 minutes |
Podcast | The Guardian: Finding dark patterns online: Chips with Everything podcast | link | Complete | 20190700, 27 minutes |
Podcast | The Guardian: How much does Google know about you? – podcast | link | Complete | 20190900, 28 minutes |
Podcast | The Guardian: Is Facebook spying on you? | link | Complete | 20190400, 29 minutes |
Podcast | War College: Bellingcat Talks Tankers, Deepfakes, and State Propaganda | link | Complete | 20190711, 32 minutes |
Podcast | War on the Rocks - Fear Not the Blue-Haired Soldier? | link | Complete | 20180515, 36 minutes |
Podcast | War on the Rocks - The Big Cyber Spectacular | link | Complete | 20180216, 49 minutes |
Reading | A daily grind: Filtering Java vulnerabilities | link | Pending | Pending |
Reading | A Tale of Two Frameworks: The NIST CSF and NIST RMF Are Not the Same | link | Complete | 20171213, 10 minutes |
Reading | Alleged Iranian Hackers Target U.S. Universities to Steal Intellectual Property, Report Reveals | link | Pending | Pending |
Reading | An Inside Look Into the World of Nigerian Scammers | link | Pending | Pending |
Reading | An Introduction to NIST Special Publication 800-171 for Higher Education Institutions | link | Complete | 20180831, 30 minutes |
Reading | Appendix B: Mapping Cybersecurity Assessment Tool to NIST Cybersecurity Framework | link | Pending | Pending |
Reading | APT 34 Is an Iran-Linked Hacking Group That Probes Critical Infrastructure (Wired) | link | Pending | Pending |
Reading | APT1: Digital appendix and indicators | link | Pending | Pending |
Reading | APT1: Exposing one of China's cyber espionage units | link | Complete | 2017 |
Reading | APT1: technical backstage malware analysis | link | Pending | Pending |
Reading | APT28: A Window Into Russia's Cyber Espionage Operations? | link | Complete | 20200219, 60 minutes |
Reading | APT28: At the Center of the Storm | link | Complete | 20200221, 60 minutes |
Reading | APT30 and the Mechanics of a Long-Running Cyber Espionage Operation | link | Pending | Pending |
Reading | APT37 (Reaper): The Overlooked North Korean Actor | link | Complete | 20180713, 30 minutes |
Reading | APT40: Examining a China-Nexus Espionage Actor | link | Pending | Pending |
Reading | Australian National University 'hit by Chinese hackers' | link | Pending | Pending |
Reading | Behind the Syrian Conflict's Digital Front Lines | link | Pending | Pending |
Reading | Big data meets Big Brother as China moves to rate its citizens | link | Pending | Pending |
Reading | Brewing up trouble: Analyzing four widely exploited Java vulnerabilities | link | Pending | Pending |
Reading | China-based hacking crew pokes holes in UK firms and drains data | link | Pending | Pending |
Reading | Chinese hackers reportedly targeted 27 universities for military secrets | link | Pending | Pending |
Reading | Chinese Hackers Target Universities in Pursuit of Maritime Military Secrets | link | Pending | Pending |
Reading | Chinese human rights activists claim their Google emails were hacked | link | Pending | Pending |
Reading | Choose Adventure: Safe Travel in Dangerous Places | link | Complete | 20231116 |
Reading | CIA pulled officers from Beijing after breach of federal personnel records | link | Pending | Pending |
Reading | CIA pulls staff from China after US government hack | link | Pending | Pending |
Reading | Deloitte: NIST Special Publication 800-171 for Higher Education | link | Pending | Pending |
Reading | Digital bread crumbs: Seven clues to identifying who's behind advanced cyber attacks | link | Pending | Pending |
Reading | DLL Side-loading: A thorn in the side of the anti-virus industry | link | Pending | Pending |
Reading | DoJ indicts Iranian hackers for stealing data from 144 US universities | link | Pending | Pending |
Reading | F.B.I. Bars Some China Scholars From Visiting U.S. Over Spying Fears | link | Pending | Pending |
Reading | Feds warn: China sending ‘thousands’ of spies to US colleges | link | Pending | Pending |
Reading | FFIEC 2016 Information Security Handbook | link | Pending | Pending |
Reading | FFIEC Booklet: Outsourcing Technology Services (3 sections) | link | Complete | 20171207, 15 minutes |
Reading | FFIEC Cybersecurity Assessment Tool | link | Pending | Pending |
Reading | FFIEC Information Technology Examination Handbook Information Security | link | Pending | Pending |
Reading | FIN10 - Anatomy of a Cyber Extortion Operation | link | Pending | Pending |
Reading | Google Official Blog: A new approach to China | link | Pending | Pending |
Reading | Hackers target research from UK universities | link | Pending | Pending |
Reading | Hackers target UK universities accredited by NCSC | link | Pending | Pending |
Reading | Hacking the Street - FIN4 Likely Playing the Market | link | Pending | Pending |
Reading | Hot knives through butter: Evading file-based sandboxes | link | Pending | Pending |
Reading | How to Build a Security Operations Center (On a Budget) (Alien Vault) | link | Pending | Pending |
Reading | How to Use (and Not Use) the NIST CSF | link | Pending | Pending |
Reading | IANS Data Compromise Awareness | link | Pending | Pending |
Reading | IFAP Electronic Announcements | link | Pending | Pending |
Reading | In China's Push For High-Tech, Hackers Target Cutting-Edge U.S. Firms | link | Pending | Pending |
Reading | Insights into Iranian Cyber Espionage: APT33 Targets Aerospace and Energy Sectors and has Ties to Destructive Malware (Mandiant/FireEye) | link | Pending | Pending |
Reading | Investigating PowerShell attacks | link | Pending | Pending |
Reading | ISMG 2015 Breach Preparedness and Response Study | link | Pending | Pending |
Reading | Legality in Cyberspace - An Adversary View (Strategic Studies Institute) | link | Pending | Pending |
Reading | Leviathan: Command and control communications on planet Earth | link | Pending | Pending |
Reading | Mysterious factory break-in raises suspicions about Chinese visit | link | Pending | Pending |
Reading | NCUA Letter 2007-CU-01 Enclosure Evaluating Third Party Relationships | link | Complete | 20171207, 20 minutes |
Reading | NCUA Letter 2007-CU-13 Evaluating Third Party Relationships | link | Complete | 20171207, 10 minutes |
Reading | NCUA Letter 2008-CU-07 FFIEC Release of Updated Business Continuity Planning Examination Handbook | link | Pending | Pending |
Reading | NCUA Letter 2008-CU-09 Evaluating Third Party Relationships Questionnaire | link | Complete | 2017 |
Reading | NCUA Letter 2008-CU-20 Evaluating Current Risks to Credit Unions | link | Pending | Pending |
Reading | NCUA Letter 2010-CU-03 Concentration Risk | link | Pending | Pending |
Reading | NCUA Letter 2013-CU-12 Supervisory Guidance on Enterprise Risk Management | link | Pending | Pending |
Reading | NCUA Letter 2016-CU-12 Risk-Based Examination Scheduling Policy | link | Pending | Pending |
Reading | NCUA Letter 2017-CU-02 Evaluating Compliance Risk – Updated Compliance Risk Indicators | link | Complete | 2017 |
Reading | NIH, FBI accuse scientists in US of sending IP to China, running shadow labs | link | Pending | Pending |
Reading | NIST Cyber Security Framework (CSF): Aligning to the NIST CSF in the AWS Cloud | link | Pending | Pending |
Reading | NIST Cyber Security Framework (CSF): Aligning to the NIST CSF in the AWS Cloud | link | Pending | Pending |
Reading | NIST: Best Practices in Cyber Security Chain Risk Management | link | Pending | Pending |
Reading | Online Banking Attacks Were Work of Iran, U.S. Officials Say (New York Times) | link | Pending | Pending |
Reading | Operation "Ke3chang": Targeted attacks against ministries of foreign affairs | link | Pending | Pending |
Reading | Operation Saffron Rose | link | Complete | 2017 |
Reading | Poison Ivy: Assessing damage and extracting intelligence | link | Pending | Pending |
Reading | Red Line Drawn: China recalculates its use of cyber espionage (Mandiant/FireEye) | link | Complete | 20180217, 30 minutes |
Reading | Report – APT 37 (Reaper) | link | Pending | Pending |
Reading | Report – APT 38: Un-usual Suspects | link | Pending | Pending |
Reading | Report – APT30 and the Mechanics of a Long-Running Cyber Espionage Operation: How a Cyber Threat Group Exploited Goverments and Commercial Entities across Southeast Asia and India for over a Decade | link | Pending | Pending |
Reading | Report – APT41: A Dual Espionage and Cyber Crime Operation | link | Pending | Pending |
Reading | Report – HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group | link | Pending | Pending |
Reading | Report – Hiding in Plain Sight: FireEye and Microsoft Expose Obfuscation Tactic | link | Pending | Pending |
Reading | Report – Russia’s APT28 Strategically Evolves its Cyber Operations | link | Pending | Pending |
Reading | Report – Southeast Asia: An Evolving Cyber Threat Landscape | link | Pending | Pending |
Reading | Russian hack of 2016 elections didn't happen | link | Pending | Pending |
Reading | SANS Institute: "A Credit Union Increased Network Security With Network Access Control Based on Great Bay Software Beacon" | link | Complete | 20171115, 15 minutes |
Reading | Sidewinder Targeted Attack against Android in the golden age of ad libraries | link | Pending | Pending |
Reading | Significant Cyber Incidents | link | Pending | Pending |
Reading | Supply chain analysis: From quartermaster to sunshop | link | Pending | Pending |
Reading | Suspected North Korean hackers target universities using Chrome extension | link | Pending | Pending |
Reading | Technical Implementation of NIST/FFIEC CSF – Detailed Hardening and Vulnerability Management Techniques | link | Pending | Pending |
Reading | The AlienVault® Incident Response Toolkit: Putting the OODA Loop to Work in the Real World (Alien Vault) | link | Pending | Pending |
Reading | The Canada-China Cyber Agreement Remains Questionable | link | Pending | Pending |
Reading | The CIA Campaign to Steal Apple's Secrets | link | Pending | Pending |
Reading | The Design and Evaluation of Physical Protection Systems | link | Complete | 20220107 |
Reading | The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage | link | Complete | 20211130 |
Reading | 13 Hours: The Inside Account of What Really Happened in Benghazi | link | Complete | 20220600 |
Reading | The Siege of Mecca: The Forgotten Uprising in Islam's Holiest Shrine & the Birth of Al-Qaeda | link | Complete | 20220700 |
Reading | The Siege: 68 Hours Inside the Taj Hotel | link | Complete | 20220800 |
Reading | The Exile: The Stunning Inside Story of Osama bin Laden and Al Qaeda in Flight | link | Complete | 20220900 |
Reading | The Little Malware That Could: Detecting and defeating the China Chopper Web Shell | link | Pending | Pending |
Reading | Thomas Rid - Cyber War (Essay) (Routledge) | link | Pending | Pending |
Reading | Top words used in spear phishing attacks | link | Pending | Pending |
Reading | Top-ranked Australian university hit by Chinese hackers: media | link | Pending | Pending |
Reading | Tracking Users on the Internet with Behavioral Patterns | link | Pending | Pending |
Reading | Volume1_2017_TAG_Cyber_Security_Fifty Controls (The Amoroso Group) | link | Pending | Pending |
Reading | Volume2_2017_TAG_Cyber_Security_Luminary Interviews (The Amoroso Group) | link | Pending | Pending |
Reading | Volume3_2017_TAG_Cyber_Security_Vendor_Listings (The Amoroso Group) | link | Pending | Pending |
Reading | What Is Intellectual Property, and Does China Steal It? | link | Pending | Pending |
Reading | Why the OPM Hack Is Far Worse Than You Imagine | link | Pending | Pending |
Reading | Wikipedia: 2015–2016 SWIFT banking hack | link | Pending | Pending |
Reading | Wikipedia: Office of Personnel Management data breach | link | Pending | Pending |
Reading | Windows Management Instrumentation (WMI) offense, defense, and forensics | link | Pending | Pending |
Reading | Zero Days, Thousands of Nights (RAND Corporation) | link | Pending | Pending |
Travel Security | link | Pending | Pending | |
Travel Security | link | Pending | Pending | |
Travel Security | link | Pending | Pending | |
Travel Security | link | Pending | Pending | |
Travel Security | link | Pending | Pending | |
Video | [Webinar] Applying the NIST Framework to Secure AWS | link | Pending | Pending |
Video | 2 1 1 Jason Scott Rescuing The Prince of Persia from the sands of time | link | Complete | 20171011, 53 minutes |
Video | 2013 NIST Training Pt 1: SP 800-39 - Hosted by the California Information Security Office | link | Pending | Pending |
Video | 2013 NIST Training Pt 2: SP 800-30 - Hosted by the California Information Security Office | link | Pending | Pending |
Video | 2013 NIST Training Pt 3: SP 800-37 - Hosted by the California Information Security Office | link | Pending | Pending |
Video | 2013 NIST Training Pt 4: SP 800-53 - Hosted by the California Information Security Office | link | Pending | Pending |
Video | 2017 08 31 12 02 Using the NIST Cybersecurity Framework to Guide your Security Program | link | Pending | Pending |
Video | A True Spy Thriller: Computer Hacking, Security, Espionage, and U.S. Counterintelligence (1990) | link | Complete | 20180828, 43 minutes |
Video | An Introduction to NIST 800-191 with Mark Riddle and Devin Casey of ISOO | link | Complete | 20200316, 48 minutes |
Video | ARCHIVE TEAM: A Distributed Preservation of Service Attack | link | Complete | 20171011, 44 minutes |
Video | Assessing your Current Cyber Security Posture with NIST • Step 1 | Spector | link | Pending | Pending |
Video | AWS Certified Cloud Practitioner Training 2020 - Full Course | link | Pending | Pending |
Video | AWS Live re:Inforce - Permission Guardrail Use Cases | link | Pending | Pending |
Video | AWS Live re:Inforce - Permission Guardrail Use Cases | link | Pending | Pending |
Video | AWS re:Inforce 2019: Aligning to the NIST Cybersecurity Framework in the AWS Cloud (GRC203-R) | link | Complete | 20200316, 47 minutes |
Video | AWS re:Inforce 2019: Architecting Security through Policy Guardrails in Amazon EKS (SDD411) | link | Pending | Pending |
Video | AWS re:Inforce 2019: AWS Security Hub: Manage Security Alerts & Automate Compliance (DEM15) | link | Pending | Pending |
Video | AWS re:Inforce 2019: Best Practices for Choosing Identity Solutions for Applications (FND215) | link | Pending | Pending |
Video | AWS re:Inforce 2019: Capital One Case Study: Addressing Compliance and Security within AWS (FND219) | link | Pending | Pending |
Video | AWS re:Inforce 2019: Encrypting Everything with AWS (SEP402) | link | Pending | Pending |
Video | AWS re:Inforce 2019: Enforcing Security Invariants with AWS Organizations (SDD314) | link | Pending | Pending |
Video | AWS re:Inforce 2019: Everything You Wanted to Know about Compliance but Were Afraid to Ask (GRC208) | link | Pending | Pending |
Video | AWS re:Inforce 2019: Evolving Perimeters w/ Guardrails, Not Gates (SDD331) | link | Pending | Pending |
Video | AWS re:Inforce 2019: How to Act on Your Security & Compliance Alerts with AWS Security Hub (FND218) | link | Pending | Pending |
Video | AWS re:Inforce 2019: Leadership Session: Governance, Risk, and Compliance (GRC326-L) | link | Pending | Pending |
Video | AWS re:Inforce 2019: Managing Multi-Account AWS Environments Using AWS Organizations (FND314) | link | Pending | Pending |
Video | AWS re:Inforce 2019: Mitigate Misconfigurations with AWS Service Catalog and Control Tower (FND311) | link | Pending | Pending |
Video | AWS re:Inforce 2019: Network Visibility into the Traffic Traversing Your AWS Infrastructure (SEP209) | link | Pending | Pending |
Video | AWS re:Inforce 2019: Pragmatic Container Security (DEM11-R) | link | Pending | Pending |
Video | AWS re:Inforce 2019: Securing Serverless and Container Services (SDD306) | link | Pending | Pending |
Video | AWS re:Inforce 2019: Security at the Speed of Cloud: How You Can Do It Now (GRC304) | link | Pending | Pending |
Video | AWS re:Inforce 2019: Security Benefits of the Nitro Architecture (SEP401-R) | link | Pending | Pending |
Video | AWS re:Inforce 2019: Security Best Practices the Well-Architected Way (SDD318) | link | Pending | Pending |
Video | AWS re:Inforce 2019: The Fundamentals of AWS Cloud Security (FND209-R) | link | Pending | Pending |
Video | AWS re:Inforce 2019: Using AWS Control Tower to Govern Multi-Account AWS Environments (GRC313-R) | link | Pending | Pending |
Video | AWS re:Invent 2018 - Keynote with Andy Jassy | link | Pending | Pending |
Video | AWS re:Invent 2019 - Keynote with Andy Jassy | link | Pending | Pending |
Video | AWS re:Invent 2019: Monitor security & automate compliance checks with AWS Security Hub (DEM157) | link | Pending | Pending |
Video | AWS Security by Design | link | Pending | Pending |
Video | AWS VPC Masterclass Webinar (2018) - Part 1 | link | Pending | Pending |
Video | Black Hat 2013 - Exploiting Network Surveillance Cameras Like a Hollywood Hacker | link | Pending | Pending |
Video | Black Hat 2013 - OPSEC Failures of Spies | link | Pending | Pending |
Video | Break Me01 And You Shall Know Me By My Trail of Documentation Jason Scott | link | Complete | 20171011, 43 minutes |
Video | BSides DC 2017 - PCI for Pen Testers | link | Pending | Pending |
Video | CDS 2018 | ATT&CKing FIN7: The Value of Using Frameworks for Threat Intelligence | link | Pending | Pending |
Video | CDS 2018 | Beyond Shared Responsibility: Using a Next-Gen SIEM to Secure Your Cloud | link | Pending | Pending |
Video | CDS 2018 | Convinced By Imposters You Think You Know | link | Pending | Pending |
Video | CDS 2018 | Cyber Security Takes A Village | link | Pending | Pending |
Video | CDS 2018 | Defending Against Evolving Network Security Threats | link | Pending | Pending |
Video | CDS 2018 | Evolving to an Intel-led Security Organization | link | Pending | Pending |
Video | CDS 2018 | Finding the Threats that Matter with Managed Defense | link | Pending | Pending |
Video | CDS 2018 | Hello, Carbanak! | link | Pending | Pending |
Video | CDS 2018 | Hunting for Platinum | link | Pending | Pending |
Video | CDS 2018 | Influence Operations Targeting the 2018 U.S. Midterms | link | Pending | Pending |
Video | CDS 2018 | Interpreting Telemetry Data to Evaluate Threat Relevance | link | Pending | Pending |
Video | CDS 2018 | Lessons Learned: Legal Issues That Arise During Incident Investigations | link | Pending | Pending |
Video | CDS 2018 | Phishing, Impersonation, and Malware: Defending Email Against Today’s Advanced Threats | link | Pending | Pending |
Video | CDS 2018 | Premediation: The Art of Proactive Remediation | link | Pending | Pending |
Video | CDS 2018 | Putting Your Incident Response Plan to the Test: How Ready Are You, Really? | link | Pending | Pending |
Video | CDS 2018 | Red Line Redrawn? Chinese APTs Resurface | link | Pending | Pending |
Video | CDS 2018 | The 2018 SEC Guidance on Cybersecurity and the Responsibilities of the Board of Directors | link | Pending | Pending |
Video | CDS 2018 | Two Factor Evolution: How Attackers Evade Multi-factor Authentication | link | Pending | Pending |
Video | CDS 2018 | Unmasking APT X | link | Pending | Pending |
Video | CDS 2018 | You’ve Got Mail! | link | Pending | Pending |
Video | Common Marking Errors on Classified Documents | link | Pending | Pending |
Video | Confessions of a Cyber Spy Hunter: Eric Winsborrow at TEDxVancouver | link | Pending | Pending |
Video | Controlled Unclassified Information | link | Pending | Pending |
Video | Controlled Unclassified Information | link | Pending | Pending |
Video | Controlled Unclassified Information - Introduction to Marking | link | Pending | Pending |
Video | Controlled Unclassified Information: Unauthorized Disclosure: Prevention and Reporting | link | Pending | Pending |
Video | CSIAC Webinar - Protecting Controlled Unclassified Information (CUI) in Nonfederal Systems and Orgs | link | Complete | 20180905, 65 minutes |
Video | CSIAC Webinar - Protecting CUI in Nonfederal Information Systems and Organizations | link | Complete | 20180905, 71 minutes |
Video | CSIAC Webinars - Meeting DFARS Controlled Unclassified Information (CUI) Compliance Standards for Federal Contractors | link | Pending | Pending |
Video | CSS2017 Session 14 SANS Training - NIST Cyber Security Framework | link | Pending | Pending |
Video | CSS2018LAS16: NIST CyberSecurity Framework Usage and Overview - SANS | link | Pending | Pending |
Video | CSS2018LAS16: NIST CyberSecurity Framework Usage and Overview - SANS | link | Pending | Pending |
Video | CTI Summit Keynote - Cliff Stoll - (Still) Stalking the Wily Hacker | link | Complete | 20180827, 65 minutes |
Video | Cyber Security: A Practical Application of NIST Cybersecurity Framework | link | Pending | Pending |
Video | Cybersecurity Framework 4 years later: What’s next for cybersecurity? | link | Pending | Pending |
Video | Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certification | Edureka | link | Pending | Pending |
Video | DARKTRACE Demo | link | Complete | 20171220, 5 minutes |
Video | DARKTRACE Demo | link | Complete | 20171220, 7 minutes |
Video | DEF CON 18 - Jason Scott - You're Stealing It Wrong! 30 Years of Inter-Pirate Battles | link | Complete | 20171011, 56 minutes |
Video | DEF CON 22 - Gene Bransfield - Weaponizing Your Pets: The War Kitteh and the Denial of Service Dog | link | Pending | Pending |
Video | DEF CON 25 - Professor Plum - Digital Vengeance Exploiting the Most Notorious C&C Toolkit | link | Pending | Pending |
Video | DEF CON 25 Recon Village - Rhett Greenhagen - Skip Tracing For Fun and Profit | link | Complete | 20171015, 43 minutes |
Video | DEFCON 17: That Awesome Time I Was Sued For Two Billion Dollars | link | Pending | Pending |
Video | Defcon 18 - How I met your girlfriend - Samy Kamkar - Part .mov | link | Pending | Pending |
Video | Defcon 18 -My life as a spyware developer - Garry Pejski - Part.mov | link | Pending | Pending |
Video | DEFCON 19: The History and the Evolution of Computer Viruses | link | Complete | 20180911, 50 minutes |
Video | Defcon 21 - Forensic Fails - Shift + Delete Won't Help You Here | link | Complete | 20180913, 47 minutes |
Video | Demo of Darktrace & Cyberseer Threat Analytics Service | link | Complete | 20171220, 15 minutes |
Video | Deploy a DoD Secure Cloud Computing Architecture Environment in AWS (119681) | link | Pending | Pending |
Video | DerbyCon 3 0 3104 The Mysterious Mister Hokum Jason Scott | link | Complete | 20171011, 42 minutes |
Video | Derivative Classification Training - Revised | link | Pending | Pending |
Video | Designing your Cyber Security framework using NIST guidelines | link | Pending | Pending |
Video | FireEye Cyber Defense Summit Keynote Series: Grady Summers, FireEye Exec VP & CTO | link | Pending | Pending |
Video | FireEye Cyber Defense Summit Keynote Series: John Watters, FireEye EVP of Global Services & Intel | link | Pending | Pending |
Video | FireEye Cyber Defense Summit Keynote Series: Kevin Mandia, FireEye CEO and Board Director | link | Pending | Pending |
Video | FireEye Cyber Defense Summit Keynote Series: NSA Sr. Technical Director David Hogue | link | Pending | Pending |
Video | GDPR Compliance: “Explain Like I’m Five” with Data Privacy Expert | link | Pending | Pending |
Video | GDPR Compliance: What You Need to Know Before May 2018 | link | Pending | Pending |
Video | George Gilder: Forget Cloud Computing, Blockchain is the Future | link | Pending | Pending |
Video | Getting Started with AWS | Amazon Web Services BASICS | link | Pending | Pending |
Video | Gig05 Pen Test War Stories Why my job is so easy and how you can make it harder Aaron Herndon | link | Pending | Pending |
Video | How to Build a Cybersecurity Program based on the NIST Cybersecurity Framework | link | Pending | Pending |
Video | How to Defend Against Web Application Security Threats | link | Pending | Pending |
Video | How to Detect and Mitigate Guardrail Violations with AWS Control Tower - AWS Online Tech Talks | link | Pending | Pending |
Video | How to Make Sense of Cybersecurity Frameworks | link | Pending | Pending |
Video | How-to Penetration Testing and Exploiting with Metasploit + Armitage + msfconsole | link | Pending | Pending |
Video | Human Subjects Research Training: "Protecting Human Subjects" - Module 1 | link | Pending | Pending |
Video | Human Subjects Research Training: "Protecting Human Subjects" - Module 2 | link | Pending | Pending |
Video | Human Subjects Research Training: "Protecting Human Subjects" - Module 3 | link | Pending | Pending |
Video | In the Realm of the Hackers (Complete) | link | Pending | Pending |
Video | Information Security Oversight Office Training Seminar | link | Pending | Pending |
Video | Intro to Risk Management & NIST Cyber Framework 101 | link | Pending | Pending |
Video | Introduction to AWS Security | link | Pending | Pending |
Video | Introduction to AWS Services | link | Pending | Pending |
Video | Introduction to Metasploit for Penetration Testing | link | Pending | Pending |
Video | Introduction to Microservices, Docker, and Kubernetes | link | Pending | Pending |
Video | Introduction to Risk Management via the NIST Cyber Security Framework | link | Pending | Pending |
Video | ISOO - CUI Briefing - January 27, 2017 | link | Pending | Pending |
Video | I've Got Logs and LEM, Now What? | link | Pending | Pending |
Video | Jason Scott - The City On The Edge Of Whatever | link | Complete | 20171011, 48 minutes |
Video | Jason Scott - THE RACE TO UNDELETE HISTORY | link | Complete | 20171011, 67 minutes |
Video | Learn How Pentesters Use Nmap To Exploit Their Victims Computer | link | Pending | Pending |
Video | Log and Event Manager Demo | link | Complete | 20171122, 27 minutes |
Video | Mastering Chaos - A Netflix Guide to Microservices | link | Pending | Pending |
Video | Metasploit with Nexpose | link | Pending | Pending |
Video | Mission (Not) Impossible: Applying NIST 800-53 High Impact-Controls on AWS for GDPR Compliance | link | Pending | Pending |
Video | Monitoring 101 - SolarWinds Lab #37 | link | Pending | Pending |
Video | Monitoring 102: Class Continues - SolarWinds Lab #41 | link | Pending | Pending |
Video | Monitoring 201: Beyond the Basics - SolarWinds Lab #54 | link | Pending | Pending |
Video | Nexpose Demo | link | Pending | Pending |
Video | Nexpose Getting Started Video | link | Pending | Pending |
Video | Nexpose Scanning | link | Pending | Pending |
Video | NIST 800 171, Best Practices Webinar | link | Pending | Pending |
Video | NIST 800-35 IT Security Services - Part 1 | link | Pending | Pending |
Video | NIST 800-35 IT Security Services - Part 2 | link | Pending | Pending |
Video | NIST 800-37 Rev. 2 - Risk Management Framework Fundamentals | link | Pending | Pending |
Video | NIST 800-39 Step 1: Risk Framing - Part 1 | link | Pending | Pending |
Video | NIST 800-39 Step 2: Risk Assessment | link | Pending | Pending |
Video | NIST 800-39 Step 3: Risk Response | link | Pending | Pending |
Video | NIST 800-39 Step 4 - Risk Monitoring | link | Pending | Pending |
Video | NIST 800-39: Risk Management Process Fundamentals | link | Pending | Pending |
Video | NIST 800-39: Step 1 Risk Framing - Part 2 | link | Pending | Pending |
Video | NIST 800-50 Part 1 - Building an IT Security Awareness and Training Program | link | Pending | Pending |
Video | NIST 800-50 Part 2 - Designing an IT Security Awareness and Training Program | link | Pending | Pending |
Video | NIST 800-50 Part 3 - Developing IT Security Awareness and Training Material | link | Pending | Pending |
Video | NIST 800-50 Part 4 - Implementing an IT Security Awareness and Training Program | link | Pending | Pending |
Video | NIST 800-50 Part 5 - IT Security Awareness and Training Program Post-Implementation | link | Pending | Pending |
Video | NIST Cybersecurity Framework and PCI DSS | link | Pending | Pending |
Video | NIST Cybersecurity Framework Practitioner Training | link | Pending | Pending |
Video | NIST RMF - System and Common Control Authorizations - Part 1 | link | Pending | Pending |
Video | NIST RMF - System and Common Control Authorizations - Part 2 | link | Pending | Pending |
Video | NIST RMF Categorize - Introduction | link | Pending | Pending |
Video | NIST RMF Categorize - Step 1 | link | Pending | Pending |
Video | NIST RMF Categorize - Step 2 | link | Pending | Pending |
Video | NIST RMF Categorize - Step 3 | link | Pending | Pending |
Video | NIST RMF Categorize - Step 4 | link | Pending | Pending |
Video | NIST RMF: Roles and Responsibilities | link | Pending | Pending |
Video | NIST SP 800-53, Revision 5 Security Controls for Information Systems and Organizations - 1 overview | link | Pending | Pending |
Video | PCI Compliance Crash Course Webinar | link | Pending | Pending |
Video | PCI Data Security Standard 3.0, Fully Explained | link | Pending | Pending |
Video | Protect Privileged Accounts with your SIEM | link | Pending | Pending |
Video | Protecting Human Subjects and Institutional Review Boards: An Overview | link | Pending | Pending |
Video | Pulling Back the Curtain on Airport Security: Can a Weapon Get Past TSA? | link | Pending | Pending |
Video | Records Management Training for Federal Agencies | link | Pending | Pending |
Video | Red Team vs. Blue Team on AWS | link | Pending | Pending |
Video | REDCap Introduction Class - Presented by Bas de Veer MS Research Consultant | link | Pending | Pending |
Video | Renowned Author Cyber Pioneer Cliff Stoll Mesmerizes at CrowdStrike Conference | link | Complete | 20180827, 63 minutes |
Video | Running an SQL Injection Attack - Computerphile | link | Pending | Pending |
Video | Save Game - The Emularity and the Future of Infinite Game | link | Complete | 20171011, 59 minutes |
Video | SolarWinds Log and Event Manager Technical Overview | link | Complete | 20171122, 28 minutes |
Video | State of the Hack - Episode 01: "State of the FIRST" | link | Pending | Pending |
Video | State of the Hack - Episode 02: “Cafe Bohannon” | link | Pending | Pending |
Video | State of the Hack - Episode 03: Hunting Targeted Attackers at Scale, Live-ish from RSA | link | Pending | Pending |
Video | State of the Hack - Episode 04: Illuminating the Adversary | link | Pending | Pending |
Video | State of the Hack - Episode 8: Cyber Security in 2019 and Beyond | link | Pending | Pending |
Video | State of the Hack Episode 06: Black Hat USA 2018 Edition | link | Pending | Pending |
Video | State of the Hack Special Black Hat Edition featuring Katie Nickels | link | Pending | Pending |
Video | State of the Hack Special Black Hat Edition featuring Matt Graeber | link | Pending | Pending |
Video | State of the Hack Special Black Hat Edition featuring Sean Metcalf | link | Pending | Pending |
Video | State of the Hack Special Cyber Defense Summit Edition: FLARE vs. Carbanak | link | Pending | Pending |
Video | State of the Hack Special Cyber Defense Summit Edition: Understanding the GRU Indictments | link | Pending | Pending |
Video | State of the Hack Special Cyber Defense Summit Edition: Upgrading to APT38 | link | Pending | Pending |
Video | State of the Hack: #NoEasyBreach REVISITED | link | Pending | Pending |
Video | State of the Hack: APT41 - Double Dragon: The Spy Who Fragged Me | link | Complete | 20190909, 31 minutes |
Video | State of the Hack: Behind the ATM Heist & Other Red Team Stories | link | Pending | Pending |
Video | State of the Hack: Episode 05: Down Periscope | link | Pending | Pending |
Video | State of the Hack: Episode 9 - Holiday APT Spectacular | link | Pending | Pending |
Video | State of the Hack: One Year after the APT1 Report | link | Complete | 20190619, 22 minutes |
Video | State of the Hack: Ransom Acts of Flyness | link | Pending | Pending |
Video | State of the Hack: Trending 10 Years of Breach Response | link | Pending | Pending |
Video | State of the Hack: Your Payment Cards Are Our Business Cards | link | Pending | Pending |
Video | Talk by Cliff Stoll | link | Complete | 20180724, 59 minutes |
Video | The 11 Tasks in the Prepare (at the SYSTEM Level) Step of the RMF | link | Pending | Pending |
Video | The 2 Tasks in the IMPLEMENT Step of the NIST RMF | link | Pending | Pending |
Video | The 3 Tasks in the CATEGORIZE Step of the NIST RMF | link | Complete | 20200512, 22 minutes |
Video | The 5 Tasks in the AUTHORIZE Step of the NIST RMF | link | Pending | Pending |
Video | The 6 Tasks in the ASSESS Step of the NIST RMF | link | Pending | Pending |
Video | The 6 Tasks in the SELECT Step of the NIST RMF | link | Pending | Pending |
Video | The 7 Tasks in the MONITOR Step of the NIST RMF | link | Pending | Pending |
Video | The 7 Tasks in the Prepare (at the ORGANIZATION Level) Step of the RMF | link | Pending | Pending |
Video | The KGB, the Computer, and Me (Complete) | link | Complete | 20180422, 57 minutes |
Video | The Nexpose Vulnerability Scanner | link | Pending | Pending |
Video | The NIST Cybersecurity Framework 4 Step Guide | link | Pending | Pending |
Video | The NIST Cybersecurity Framework summary | link | Pending | Pending |
Video | The Snowden files -- the inside story of the world’s most wanted man | Luke Harding | TEDxAthens | link | Pending | Pending |
Video | Top 12 AWS NIST Security and Compliance Best Practices | link | Pending | Pending |
Video | Tracking a Spy Through the Maze of Computer Espionage: Early Hacking Techniques - History (1989) | link | Pending | Pending |
Video | VCFMW 11 - Bil Herd: Tales From Inside Commodore | link | Pending | Pending |
Video | Virtual Session: NIST Cybersecurity Framework Explained | link | Pending | Pending |
Video | Why Google won't protect you from big brother: Christopher Soghoian at TEDxSanJoseCA 2012 | link | Pending | Pending |
Video | You've Already Been Hacked! Now What? - SolarWinds Lab #27 | link | Pending | Pending |
Webinar | Campus Research Computing Consortium: HIPAA-aligned data and Public Cloud Platforms: An ongoing journey through technical, cost, compliance, and information assurance challenges | link | Complete | 20200116, 60 minutes |
Webinar | CUES: Managing Third Party Cybersecurity | link | Complete | 20180411, 60 minutes |
Webinar | CUES: Simplifying Cyber Security and Today's Growing Regulatory Compliance | link | Complete | 20180213, 60 minutes |
Webinar | December 2017 Webinar PCI DSS V 3 2 Requirements | link | Pending | Pending |
Webinar | FERPA 101 for Educational Agencies - Webinar Recording (2011) | link | Pending | Pending |
Webinar | FFIEC: Financial Services Cybersecurity Profile: A NIST-based approach to harmonize cybersecurity risk management and compliance | link | Complete | 20180919, 60 minutes |
Webinar | FS-ISAC/NCUA: NCUA’s Automated Cybersecurity Examination Tool (ACET) | link | Complete | 20180405, 120 minutes |
Webinar | GDPR Compliance: “Explain Like I’m Five” with Data Privacy Expert | link | Pending | Pending |
Webinar | GDPR Compliance: What You Need to Know Before May 2018 | link | Pending | Pending |
Webinar | Human Subjects Research Training: "Protecting Human Subjects" - Module 1 | link | Pending | Pending |
Webinar | Human Subjects Research Training: "Protecting Human Subjects" - Module 2 | link | Pending | Pending |
Webinar | Human Subjects Research Training: "Protecting Human Subjects" - Module 3 | link | Pending | Pending |
Webinar | PCI Compliance Crash Course Webinar | link | Pending | Pending |
Webinar | PCI Data Security Standard 3.0, Fully Explained | link | Pending | Pending |
Webinar | Protecting Human Subjects and Institutional Review Boards: An Overview | link | Pending | Pending |
Webinar | REDCap Introduction Class - Presented by Bas de Veer MS Research Consultant | link | Pending | Pending |
Webinar | MS-ISAC Presentation: Texas August Ransomware Incident | link | Complete | 20200319, 60 minutes |
Webinar | CITI Program: GDPR: Top Noncompliance Risks and Mitigation Strategies | link | Complete | 20210416, 60 minutes |
Webinar | Riskonnect Risk@Work Series: Building a Business Case for GRC | link | Complete | 20230316, 60 minutes |
Webinar | SMA STRATCOM Speaker Session: How Strategy Must Align to Strategic Environments: Deterrence and Initiative Persistence w/ Dr. Richard Harknett | link | Complete | 20230510, 30 minutes |