Personal Information
Organization / Workplace
Washington D.C. Metro Area United States
Occupation
Technical Consultant
Industry
Technology / Software / Internet
About
CYBER OPERATIONS (INCIDENT RESPONSE, NESSUS, EMAIL SECURITY, REPORTING)
IT GOVERNANCE (CHANGE MANAGEMENT, GRC)
IT POLICY (ICAM, CLOUD, CRYPTO, MOBILE, FISMA)
VULNERABILITY MANAGEMENT (TENABLE/NESSUS)
SECURITY AWARENESS TRAINING MANAGEMENT
PROGRAM MANAGEMENT SUPPORT
FISMA COMPLIANCE
PRIVACY COMPLIANCE
Tags
rmf
nist
security controls
assurance
implemented-by
privacy-related
control attributes
baseline controls
nist sp 800-53 revision 5 (draft)
fedramp 2.0 control implementation summary (cis)
cyber security framework
map to nist sp 800-53
assessment methods and objects
determine-if-statements
nist sp 800-53a revision 4
step 4: access
nist sp 800-53 revision 4 security controls
podcast series
cybersecurity
sei cert carnegie mellon
incident handling
cnd
cndsp assessment
critical security controls (csc) v5.0; nist sp 800
nist sp 800-53 revision 4 without control enhancem
council on cybersecurity; critical security contro
critical security controls (csc) v5; nist sp 800-5
map the council on cybersecurity critical security
map the council on cybersecuritys critical securit
nist sp 800 53 revision 4.
step 4
assess
fedramp v2.0
policy and procedures
security assessment plan (sap)
baseline
moderate
nist sp 800 53 revision 4 low
impact
high
nist sp 800-53 rev.4
csc v.4.1
counciloncybersecurity
council on cyber security
information sensitivity level
impact assessment
information assurance
nist sp 800-60 vol2 rel1
fisma
security attributes
information security fundamentals
disa ccri stig information assurance
nessus .audit wmic
risk assessment
sp 800-30
control enhancements
risk management framework
nist sp 800-53 revision 3
supplementary guidance
citrix
virtual desktop infrastructure
vdi
vmware
application virtualization
med-v
See more
Presentations
(9)Documents
(17)Likes
(3)Big Data Analytics for Cyber Security: A Quick Overview
Femi Ashaye
•
8 years ago
DojoSec FISMA Presentation
danphilpott
•
14 years ago
RMF STEP 2: SELECT (NIST 800-53 Rev. 3 Controls, Enhancements and Supplemental Guidance)
James W. De Rienzo
•
10 years ago
Personal Information
Organization / Workplace
Washington D.C. Metro Area United States
Occupation
Technical Consultant
Industry
Technology / Software / Internet
About
CYBER OPERATIONS (INCIDENT RESPONSE, NESSUS, EMAIL SECURITY, REPORTING)
IT GOVERNANCE (CHANGE MANAGEMENT, GRC)
IT POLICY (ICAM, CLOUD, CRYPTO, MOBILE, FISMA)
VULNERABILITY MANAGEMENT (TENABLE/NESSUS)
SECURITY AWARENESS TRAINING MANAGEMENT
PROGRAM MANAGEMENT SUPPORT
FISMA COMPLIANCE
PRIVACY COMPLIANCE
Tags
rmf
nist
security controls
assurance
implemented-by
privacy-related
control attributes
baseline controls
nist sp 800-53 revision 5 (draft)
fedramp 2.0 control implementation summary (cis)
cyber security framework
map to nist sp 800-53
assessment methods and objects
determine-if-statements
nist sp 800-53a revision 4
step 4: access
nist sp 800-53 revision 4 security controls
podcast series
cybersecurity
sei cert carnegie mellon
incident handling
cnd
cndsp assessment
critical security controls (csc) v5.0; nist sp 800
nist sp 800-53 revision 4 without control enhancem
council on cybersecurity; critical security contro
critical security controls (csc) v5; nist sp 800-5
map the council on cybersecurity critical security
map the council on cybersecuritys critical securit
nist sp 800 53 revision 4.
step 4
assess
fedramp v2.0
policy and procedures
security assessment plan (sap)
baseline
moderate
nist sp 800 53 revision 4 low
impact
high
nist sp 800-53 rev.4
csc v.4.1
counciloncybersecurity
council on cyber security
information sensitivity level
impact assessment
information assurance
nist sp 800-60 vol2 rel1
fisma
security attributes
information security fundamentals
disa ccri stig information assurance
nessus .audit wmic
risk assessment
sp 800-30
control enhancements
risk management framework
nist sp 800-53 revision 3
supplementary guidance
citrix
virtual desktop infrastructure
vdi
vmware
application virtualization
med-v
See more