SlideShare a Scribd company logo
FISMArtsImproving Retention of FISMA Guidance Details with Mnemosyne A solution for effective memorization and recall of federal Information Assurance guidance
About Me Founder of FISMApedia.org and FISMArts Employed by Tantus Technologies FISMA Instructor with Potomac Forum Blogger with www.Guerilla-CISO.com Twitter: @danphilpott 2
Agenda The Need The Solution The Process Demonstration Resources 3
The Need Federal Information Assurance staff must be familiar with and cognizant of a large amount of detailedinformation. Not all staff practicing federal Information Assurance are trained for the task. Specific details are critical to success. 4
The Need – By the Numbers Example: NIST SP 800-53 Revision 3 198 Security Controls 415 Security Control Enhancements 144 Terms For each Security Control and Security Control Enhancement there is text describing the control plus supplemental guidance.   Without understanding all of a control and enhancements misinterpretations are common. 5
The Need – By the Library The Core Documents: NIST FIPS Publication 199 NIST FIPS Publication 200 NIST Special Publication 800-18 NIST Special Publication 800-30 NIST Special Publication 800-37 NIST Special Publication 800-39 NIST Special Publication 800-53 NIST Special Publication 800-53A NIST Special Publication 800-59 NIST Special Publication 800-60 (two volumes) 6 1 Adapted from Martin Nystrand/John Swales characteristics of a discourse community.
The Need – By the Library NIST Special Publication library: ~116 OMB Memoranda: ~20 Plus hundreds of additional NIST Interagency Reports, Security Bulletins and FIPS Publications This is a large Body of Knowledge 7
The Need – By the Gaps Classes present excellent overviews Independent Study can fill in details not covered in the overviews On-the-Job Training will provide detailed knowledge in a piecemeal fashion How does an information assurance professional systematically memorize pertinent guidance? 8
The Solution - Mnemosyne Flashcards?  Really? 9
The Solution - Mnemosyne More than flashcards Memorization based on the spacing effect Research based spaced repetition algorithm Handles text, images and sound Open source software Cross-platform (Windows, Mac and Linux) Learn at your own pace 10
The Solution – FISMArts Focused on providing FISMA and federal Information Assurance training material Uses authoritative source documents from NIST and OMB to create Mnemosyne content Development is simple and flexible Simply asks questions that can be answered by information in authoritative documents User rates their response If they do poorly they are asked more frequently If they do well they are asked less frequently 11
The Solution – FISMArts Content is sourced strictly from: Published Federal documents (public domain) Data sources with Creative Commons compatible licenses User generated contributions Content is licensed under the Creative Common Attribution-Share Alike 3.0 United States License 12
The Process – One Use Case Moving from source document to Mnemosyne Review document to identify important details Find line which describes the detail Formulate question answered by line Write question and line to a single line in a text file, separated by a tab character Import file into Mnemosyne Save file and distribute 13
The Process – Anything Is Possible Want to provide a tool to train staff to spot physical security problems? Take a picture of an example and ask staff to rate their response Want to help staff learn organizational policy? The authoritative document is your policy Development is simple so testing different solutions is easy. 14
Demonstration 15
Resources FISMArts –  http://fismapedia.org/index.php?title=FISMArts FISMApedia – http://fismapedia.org Mnemosyne Project–  http://www.mnemosyne-proj.org/ 16
Questions? 17
Contact Information Daniel Philpott Email: danphilpott@gmail.com Twitter: @danphilpott Telephone: (301) 825-5722 http://fismapedia.org 18

More Related Content

Viewers also liked

Cloud Computing and ROI
Cloud Computing and ROICloud Computing and ROI
Cloud Computing and ROI
Chris Sparshott
 
Luxury Real Estate Stats 4 26
Luxury Real Estate Stats 4 26Luxury Real Estate Stats 4 26
Luxury Real Estate Stats 4 26njhousehelper
 
IBM MQ v8 enhancements
IBM MQ v8 enhancementsIBM MQ v8 enhancements
IBM MQ v8 enhancements
Chris Sparshott
 
Annette Kurman | Assisted Living Presentation
Annette Kurman  | Assisted Living PresentationAnnette Kurman  | Assisted Living Presentation
Annette Kurman | Assisted Living Presentation
Annette Kurman, APR, MBA, BSN
 
Sales Presentation
Sales PresentationSales Presentation
Sales Presentationsjpfeufer
 
Introduce Moodle
Introduce MoodleIntroduce Moodle
Introduce Moodle
Brian
 
NETTAB 2012 flyer
NETTAB 2012 flyerNETTAB 2012 flyer
NETTAB 2012 flyer
Dan Bolser
 
Wikipedia and the Global Brain
Wikipedia and the Global BrainWikipedia and the Global Brain
Wikipedia and the Global Brain
Dan Bolser
 
Product Platform
Product PlatformProduct Platform
Product Platform
donwilkinson
 
Alloy - SAP Integration
Alloy - SAP IntegrationAlloy - SAP Integration
Alloy - SAP Integration
Chris Sparshott
 
218畢旅byShirley
218畢旅byShirley218畢旅byShirley
218畢旅byShirley
high18
 
Press Release Vietnam 2009 English
Press Release Vietnam 2009 EnglishPress Release Vietnam 2009 English
Press Release Vietnam 2009 English
Le Thuy Hanh
 
Media Kit Live Deal 3 5 09
Media Kit Live Deal 3 5 09Media Kit Live Deal 3 5 09
Media Kit Live Deal 3 5 09randiw37
 
Chien luoc-xay-dung-thuong-hieu-qua-mang-xa-hoi tại VCCI
Chien luoc-xay-dung-thuong-hieu-qua-mang-xa-hoi tại VCCIChien luoc-xay-dung-thuong-hieu-qua-mang-xa-hoi tại VCCI
Chien luoc-xay-dung-thuong-hieu-qua-mang-xa-hoi tại VCCILe Thuy Hanh
 
Lotus Mashups step by step installation guide
Lotus Mashups step by step installation guideLotus Mashups step by step installation guide
Lotus Mashups step by step installation guide
Chris Sparshott
 
Cellnetrix brochure 2013
Cellnetrix brochure 2013Cellnetrix brochure 2013
Cellnetrix brochure 2013
Vladimir Nagin
 
BioWikis BSB10
BioWikis BSB10BioWikis BSB10
BioWikis BSB10
Dan Bolser
 

Viewers also liked (20)

Cloud Computing and ROI
Cloud Computing and ROICloud Computing and ROI
Cloud Computing and ROI
 
Luxury Real Estate Stats 4 26
Luxury Real Estate Stats 4 26Luxury Real Estate Stats 4 26
Luxury Real Estate Stats 4 26
 
IBM MQ v8 enhancements
IBM MQ v8 enhancementsIBM MQ v8 enhancements
IBM MQ v8 enhancements
 
Annette Kurman | Assisted Living Presentation
Annette Kurman  | Assisted Living PresentationAnnette Kurman  | Assisted Living Presentation
Annette Kurman | Assisted Living Presentation
 
Sales Presentation
Sales PresentationSales Presentation
Sales Presentation
 
Test
TestTest
Test
 
Introduce Moodle
Introduce MoodleIntroduce Moodle
Introduce Moodle
 
NETTAB 2012 flyer
NETTAB 2012 flyerNETTAB 2012 flyer
NETTAB 2012 flyer
 
A tong quan
A   tong quanA   tong quan
A tong quan
 
Wikipedia and the Global Brain
Wikipedia and the Global BrainWikipedia and the Global Brain
Wikipedia and the Global Brain
 
Product Platform
Product PlatformProduct Platform
Product Platform
 
Alloy - SAP Integration
Alloy - SAP IntegrationAlloy - SAP Integration
Alloy - SAP Integration
 
Folder Arena De NegóCios
Folder Arena De NegóCiosFolder Arena De NegóCios
Folder Arena De NegóCios
 
218畢旅byShirley
218畢旅byShirley218畢旅byShirley
218畢旅byShirley
 
Press Release Vietnam 2009 English
Press Release Vietnam 2009 EnglishPress Release Vietnam 2009 English
Press Release Vietnam 2009 English
 
Media Kit Live Deal 3 5 09
Media Kit Live Deal 3 5 09Media Kit Live Deal 3 5 09
Media Kit Live Deal 3 5 09
 
Chien luoc-xay-dung-thuong-hieu-qua-mang-xa-hoi tại VCCI
Chien luoc-xay-dung-thuong-hieu-qua-mang-xa-hoi tại VCCIChien luoc-xay-dung-thuong-hieu-qua-mang-xa-hoi tại VCCI
Chien luoc-xay-dung-thuong-hieu-qua-mang-xa-hoi tại VCCI
 
Lotus Mashups step by step installation guide
Lotus Mashups step by step installation guideLotus Mashups step by step installation guide
Lotus Mashups step by step installation guide
 
Cellnetrix brochure 2013
Cellnetrix brochure 2013Cellnetrix brochure 2013
Cellnetrix brochure 2013
 
BioWikis BSB10
BioWikis BSB10BioWikis BSB10
BioWikis BSB10
 

Similar to FISMArts - Improving Retention of FISMA Guidance Details with Mnemosyne

CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
mccormicknadine86
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
sleeperharwell
 
Securing Citizen Facing Applications
Securing Citizen Facing ApplicationsSecuring Citizen Facing Applications
Securing Citizen Facing Applications
edwinlorenzana
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009
Donald E. Hester
 
Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Perpetual Information Security - Driving Data Protection in an Evolving Compl...Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Perpetual Information Security - Driving Data Protection in an Evolving Compl...
SafeNet
 
19Question 1 4 4 pointsLO5 What is a packetQu.docx
19Question 1 4  4 pointsLO5 What is a packetQu.docx19Question 1 4  4 pointsLO5 What is a packetQu.docx
19Question 1 4 4 pointsLO5 What is a packetQu.docx
aulasnilda
 
University of maryland infa 620 homework help
University of maryland infa 620 homework helpUniversity of maryland infa 620 homework help
University of maryland infa 620 homework help
Olivia Fournier
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
Ben Rothke
 
Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information security
Major Hayden
 
Building A Modern Security Policy For Social Media and Government
Building A  Modern  Security  Policy For  Social  Media and GovernmentBuilding A  Modern  Security  Policy For  Social  Media and Government
Building A Modern Security Policy For Social Media and Government
Michael Smith
 
Ask me anything: A Conversational Interface to Augment Information Security w...
Ask me anything:A Conversational Interface to Augment Information Security w...Ask me anything:A Conversational Interface to Augment Information Security w...
Ask me anything: A Conversational Interface to Augment Information Security w...
Matthew Park
 
Meeting the True Intent of File Integrity Monitoring
Meeting the True Intent of File Integrity MonitoringMeeting the True Intent of File Integrity Monitoring
Meeting the True Intent of File Integrity Monitoring
Tripwire
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
Cristian Mihai
 
Common Sense Security Framework
Common Sense Security FrameworkCommon Sense Security Framework
Common Sense Security Framework
Jerod Brennen
 
Answer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docxAnswer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docx
justine1simpson78276
 
Joe Mc Adams Power Point Resume V3
Joe Mc Adams Power Point Resume V3Joe Mc Adams Power Point Resume V3
Joe Mc Adams Power Point Resume V3jmcadams14
 
4 questions to help you secure ePHI today
4 questions to help you secure ePHI today4 questions to help you secure ePHI today
4 questions to help you secure ePHI today
Sarabeth Marcello
 
Week 3. Discussion .docx
Week 3.   Discussion                                            .docxWeek 3.   Discussion                                            .docx
Week 3. Discussion .docx
melbruce90096
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
infosec train
 
Worldwide Intranet Challenge Intra Team Presentation V4
Worldwide Intranet Challenge   Intra Team Presentation V4Worldwide Intranet Challenge   Intra Team Presentation V4
Worldwide Intranet Challenge Intra Team Presentation V4
Deloitte Australia
 

Similar to FISMArts - Improving Retention of FISMA Guidance Details with Mnemosyne (20)

CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
Securing Citizen Facing Applications
Securing Citizen Facing ApplicationsSecuring Citizen Facing Applications
Securing Citizen Facing Applications
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009
 
Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Perpetual Information Security - Driving Data Protection in an Evolving Compl...Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Perpetual Information Security - Driving Data Protection in an Evolving Compl...
 
19Question 1 4 4 pointsLO5 What is a packetQu.docx
19Question 1 4  4 pointsLO5 What is a packetQu.docx19Question 1 4  4 pointsLO5 What is a packetQu.docx
19Question 1 4 4 pointsLO5 What is a packetQu.docx
 
University of maryland infa 620 homework help
University of maryland infa 620 homework helpUniversity of maryland infa 620 homework help
University of maryland infa 620 homework help
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
 
Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information security
 
Building A Modern Security Policy For Social Media and Government
Building A  Modern  Security  Policy For  Social  Media and GovernmentBuilding A  Modern  Security  Policy For  Social  Media and Government
Building A Modern Security Policy For Social Media and Government
 
Ask me anything: A Conversational Interface to Augment Information Security w...
Ask me anything:A Conversational Interface to Augment Information Security w...Ask me anything:A Conversational Interface to Augment Information Security w...
Ask me anything: A Conversational Interface to Augment Information Security w...
 
Meeting the True Intent of File Integrity Monitoring
Meeting the True Intent of File Integrity MonitoringMeeting the True Intent of File Integrity Monitoring
Meeting the True Intent of File Integrity Monitoring
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Common Sense Security Framework
Common Sense Security FrameworkCommon Sense Security Framework
Common Sense Security Framework
 
Answer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docxAnswer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docx
 
Joe Mc Adams Power Point Resume V3
Joe Mc Adams Power Point Resume V3Joe Mc Adams Power Point Resume V3
Joe Mc Adams Power Point Resume V3
 
4 questions to help you secure ePHI today
4 questions to help you secure ePHI today4 questions to help you secure ePHI today
4 questions to help you secure ePHI today
 
Week 3. Discussion .docx
Week 3.   Discussion                                            .docxWeek 3.   Discussion                                            .docx
Week 3. Discussion .docx
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
Worldwide Intranet Challenge Intra Team Presentation V4
Worldwide Intranet Challenge   Intra Team Presentation V4Worldwide Intranet Challenge   Intra Team Presentation V4
Worldwide Intranet Challenge Intra Team Presentation V4
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 

FISMArts - Improving Retention of FISMA Guidance Details with Mnemosyne

  • 1. FISMArtsImproving Retention of FISMA Guidance Details with Mnemosyne A solution for effective memorization and recall of federal Information Assurance guidance
  • 2. About Me Founder of FISMApedia.org and FISMArts Employed by Tantus Technologies FISMA Instructor with Potomac Forum Blogger with www.Guerilla-CISO.com Twitter: @danphilpott 2
  • 3. Agenda The Need The Solution The Process Demonstration Resources 3
  • 4. The Need Federal Information Assurance staff must be familiar with and cognizant of a large amount of detailedinformation. Not all staff practicing federal Information Assurance are trained for the task. Specific details are critical to success. 4
  • 5. The Need – By the Numbers Example: NIST SP 800-53 Revision 3 198 Security Controls 415 Security Control Enhancements 144 Terms For each Security Control and Security Control Enhancement there is text describing the control plus supplemental guidance. Without understanding all of a control and enhancements misinterpretations are common. 5
  • 6. The Need – By the Library The Core Documents: NIST FIPS Publication 199 NIST FIPS Publication 200 NIST Special Publication 800-18 NIST Special Publication 800-30 NIST Special Publication 800-37 NIST Special Publication 800-39 NIST Special Publication 800-53 NIST Special Publication 800-53A NIST Special Publication 800-59 NIST Special Publication 800-60 (two volumes) 6 1 Adapted from Martin Nystrand/John Swales characteristics of a discourse community.
  • 7. The Need – By the Library NIST Special Publication library: ~116 OMB Memoranda: ~20 Plus hundreds of additional NIST Interagency Reports, Security Bulletins and FIPS Publications This is a large Body of Knowledge 7
  • 8. The Need – By the Gaps Classes present excellent overviews Independent Study can fill in details not covered in the overviews On-the-Job Training will provide detailed knowledge in a piecemeal fashion How does an information assurance professional systematically memorize pertinent guidance? 8
  • 9. The Solution - Mnemosyne Flashcards? Really? 9
  • 10. The Solution - Mnemosyne More than flashcards Memorization based on the spacing effect Research based spaced repetition algorithm Handles text, images and sound Open source software Cross-platform (Windows, Mac and Linux) Learn at your own pace 10
  • 11. The Solution – FISMArts Focused on providing FISMA and federal Information Assurance training material Uses authoritative source documents from NIST and OMB to create Mnemosyne content Development is simple and flexible Simply asks questions that can be answered by information in authoritative documents User rates their response If they do poorly they are asked more frequently If they do well they are asked less frequently 11
  • 12. The Solution – FISMArts Content is sourced strictly from: Published Federal documents (public domain) Data sources with Creative Commons compatible licenses User generated contributions Content is licensed under the Creative Common Attribution-Share Alike 3.0 United States License 12
  • 13. The Process – One Use Case Moving from source document to Mnemosyne Review document to identify important details Find line which describes the detail Formulate question answered by line Write question and line to a single line in a text file, separated by a tab character Import file into Mnemosyne Save file and distribute 13
  • 14. The Process – Anything Is Possible Want to provide a tool to train staff to spot physical security problems? Take a picture of an example and ask staff to rate their response Want to help staff learn organizational policy? The authoritative document is your policy Development is simple so testing different solutions is easy. 14
  • 16. Resources FISMArts – http://fismapedia.org/index.php?title=FISMArts FISMApedia – http://fismapedia.org Mnemosyne Project– http://www.mnemosyne-proj.org/ 16
  • 18. Contact Information Daniel Philpott Email: danphilpott@gmail.com Twitter: @danphilpott Telephone: (301) 825-5722 http://fismapedia.org 18