Mapping the Path: A Strategic Analysis of CISA CPGs as a Foundation for CMMC
Discusses how small and medium-sized businesses can use CISA Cybersecurity Performance Goals to align with CMMC requirements and strengthen their cybersecurity readiness.
A growing collection of coursework, research projects, and curiosities that capture how I think about technology and design.
Independent explorations that do not belong to a single class, but capture the ideas I keep circling back to.
Discusses how small and medium-sized businesses can use CISA Cybersecurity Performance Goals to align with CMMC requirements and strengthen their cybersecurity readiness.
Discusses how quantum computing reshapes cybersecurity by threatening current encryption systems and proposes the Quantum Business Risk Initiative as a governance framework to guide organizations toward post-quantum readiness and resilience.
Typing Away :)
Dive into the writing that emerged from specific classes. Each collection links out to supporting material and individual papers.
This course combined concepts of audit management, governance, IS controls, human capital management, strategic program development, and financial expertise that are vital to leading a highly successful IS program.
Discusses the points that to be considered during control selection and explains how to implement them.
Discusses the importance of the Sarbanes-Oxley Act and how to manage key issues of it.
Discusses the role of the board of directors and why should they have a clear understanding of the organization's needs
Discusses the crucial role that a CISO plays in an organization and how they should report.
Discusses the various laws that affect organizational security, such as HIPPA, FISMA, HITECH and GDPR.
Discusses how compliance auditing ensures accountability and enhances organizational resilience.
Discusses the 5 of traditional project management.
Discusses how effective stakeholder management supports sustainable organizational performance.
This course covered foundational technical, managerial, and policy concepts of information security.
A threat intelligence report discussing the 2024 Ascension Health ransomware attack.
Breifly outlines the dam sector as critical infastructure and what threats adn controls may exist.
This course introduced the 5 domains of the cyber intelligence framework, as well as other important intelligence concepts such as threat modeling.
Outlines three popular tools used with Kali Linux and a hypothetical attack scenario using them.
Outlines intelligence requiremnets of an imaginary company known as Tratans Energy Co.
Outlines data sources of Assignment 2's intelliegence requirements and their reporting activities.
A cyber threat analysis report generated from CSIS data, and critically analyses the reliability of the CSIS.
Outlines what building a CTIC may look like for a hypothecital daughter company to Tartans Energy Co. called Scotty Manufacturing Inc.