Using Lifecyclemanagement to map out your program/plan/policy requirements. Did you know that mapping your requirements to […]
From Policy to Implementation Did you ever wonder what drives policies, and how these policies drive […]
Validation, Verification, Certification & Accreditation How does it all come together ?
The (IRP) Incident Response Plan Incident response plan. This is how it comes together.
The BCP/DR Process A mindmap of the BCP/DR Process, including the steps as well as some […]
Link Encryption vs End-To-End This example may help you with seeing the difference between link encryption […]
Asset Security meets Data Lifecycle Not the Life of Brian, but the life of assets …. […]
Biba, Bell LaPadula, Clark Wilson, Graham Dening The easy way to these models …. is understanding […]
Differential vs Incremental backup See how the size grows? See the restore capabilities & requirements?
Layered Defense/Defense in depth Layered defense…. this is what it actually looks like….
IM/BCP/DR … and of course Controls As the initial set of controls is driven by the […]
Data Classification & Data States Just a quick look on the how and why of the […]
RMF – Conceptual Expansion Risk management frameworks can be hard to understand and comprehend.Below is an […]
Interconnecting Models … Dening, BLP, Biba, Clark Wilson …. did you ever think you could create […]
Overview of the Business – Infrastructure It all starts with the business mission, vision & strategy, […]
Capability Maturity Model – Simplified Capability Maturity Models can be hard to understand, until you see […]
Change Management meets RMF Change management is a process that was introduced, for managing risk during […]
Here is my CISSP journey… First, my background. I’ve been in IT since 1997, arriving late […]
I recently passed the CISSP Exam at 100 questions with one hour remaining. Background: Finance/Accounting/CPA Testing […]
This is kind of long – sorry, Firstly about the test as I realize this is […]
My Background I have 5 years’ experience as a systems administrator. That’s covered everything from network […]
Background Experience: 3 years of DFIR 3 years of Red Team 2 years of Security analyst […]
Background I studied SSCP for 2 weeks, and passed about a month ago. Have been in […]
Start with a Solid Foundation to Secure Your CISSP! The Effective CISSP: Security and Risk Management is […]