Latest Discussions

  • Posted in: CISM Exam prep

    A. Develop a comprehensive methodology that defines and documents project needs, is the first step using requirements engineering approach ------------------------------ Juan Sotelo Morales Supervisor De Seguridad ------------------------------

  • Posted in: Audit and Assurance

    If you want to learn, I recommend the Holiday Hack Challenges .  They're from Ed Skoudis (and team).  Ed is the author of SANS SEC504: Hacker Techniques, Exploits & Incident Handling . The challenges are free, fun, and educational.  They're archived, ...

  • Posted in: SheLeadsTech

    Here in Scotland, we have a brilliant team who do events to reach kids aged 9-12 to show them role models in STEM, have a look at their website; www.smartstems.org There is also the STEM ambassador program that anyone can get involved in to get more ...

  • Posted in: Governance

    Hello, not a definition answer but something to consider.  One of the big takeaways for me in reading the updated NIST SP 800-37 (Risk Management Framework...) is the changing of "Information Security" to just "Security" or "Security and Privacy." ------------------------------ ...

Volunteer Opportunities

  • Friday, January 04, 2019 - (open-ended)
    Online Opportunity
    Microvolunteerism (Quick task for an individual)

Most Active Members