#Procedures

BCWHSBCWHS
2025-05-31

Plans, Policies, and Procedures: ISO 9001:2015
An international standard for quality management systems (QMS).
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: ISO 9001:2015
An international standard for quality management systems (QMS).
BCWHSBCWHS
2025-05-30

Plans, Policies, and Procedures: Internet Usage
Defines how employees can and cannot use the internet at work.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: Internet Usage
Defines how employees can and cannot use the internet at work.
BCWHSBCWHS
2025-05-29

Plans, Policies, and Procedures: Information Security
Documented set of policies, objectives, systems, and processes that an organization uses to protect sensitive data and critical resources.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: Information Security
Documented set of policies, objectives, systems, and processes that an organization uses to protect sensitive data and critical resources.
BCWHSBCWHS
2025-05-28

Plans, Policies, and Procedures: High-Risk User
High-risk users are the top users in an organization who have had at least one instance of risky behavior, or events.
blackcatwhitehatsecurity.com
-Risk

Plans, Policies, and Procedures: High-Risk User
High-risk users are the top users in an organization who have had at least one instance of risky behavior, or events.
BCWHSBCWHS
2025-05-28

Plans, Policies, and Procedures: Identification and Authentication
Defines how an organization establishes and verifies a user's identity for access to systems and resources.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: Identification and Authentication
Defines how an organization establishes and verifies a user's identity for access to systems and resources.
BCWHSBCWHS
2025-05-27

Plans, Policies, and Procedures: Guest Access
Defines how external individuals can access and interact with an organization's resources and systems.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: Guest Access
Defines how external individuals can access and interact with an organization's resources and systems.
BCWHSBCWHS
2025-05-26

Plans, Policies, and Procedures: Gramm-Leach-Bliley Act (GLBA)
A federal law that requires financial institutions to explain their information-sharing practices to customers and to safeguard sensitive data.
blackcatwhitehatsecurity.com
-Leach-Bliley

Plans, Policies, and Procedures: Gramm-Leach-Bliley Act (GLBA)
A federal law that requires financial institutions to explain their information-sharing practices to customers and to safeguard sensitive data.
BCWHSBCWHS
2025-05-25

Plans, Policies, and Procedures: FedRAMP
A government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services used by federal agencies.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: FedRAMP
A government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services used by federal agencies.
BCWHSBCWHS
2025-05-23

Plans, Policies, and Procedures: Equipment Disposal
Outlines the procedures for responsibly managing assets that are no longer needed, ensuring proper data sanitization, and adhering to legal and environmental regulations.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: Equipment Disposal
Outlines the procedures for responsibly managing assets that are no longer needed, ensuring proper data sanitization, and adhering to legal and environmental regulations.
BCWHSBCWHS
2025-05-22

Plans, Policies, and Procedures: Encryption
A set of guidelines that an organization uses to manage and control the encryption of its data, ensuring its confidentiality and integrity.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: Encryption
A set of guidelines that an organization uses to manage and control the encryption of its data, ensuring its confidentiality and integrity.
BCWHSBCWHS
2025-05-21

Plans, Policies, and Procedures: Disaster and Recovery
An approach that outlines procedures and tools to restore critical IT systems, data, and operations after a disruption, ensuring business continuity and minimizing downtime.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: Disaster and Recovery
An approach that outlines procedures and tools to restore critical IT systems, data, and operations after a disruption, ensuring business continuity and minimizing downtime.
BCWHSBCWHS
2025-05-20

Plans, Policies, and Procedures: Digital Operational Resilience Act (DORA)
An EU regulation aimed at strengthening the digital operational resilience of the financial sector.
blackcatwhitehatsecurity.com
#(DORA)

Plans, Policies, and Procedures: Digital Operational Resilience Act (DORA)
An EU regulation aimed at strengthening the digital operational resilience of the financial sector.
BCWHSBCWHS
2025-05-19

Plans, Policies, and Procedures: COSO
An organization that develops guidelines for businesses to evaluate internal controls, risk management, and fraud deterrence.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: COSO
An organization that develops guidelines for businesses to evaluate internal controls, risk management, and fraud deterrence.
BCWHSBCWHS
2025-05-17

Plans, Policies, and Procedures: CMMC 2.0
A revised program designed to ensure Department of Defense (DoD) contractors and subcontractors adequately protect sensitive information (FCI and CUI) by streamlining requirements.
blackcatwhitehatsecurity.com
#2.0

Plans, Policies, and Procedures: CMMC 2.0
A revised program designed to ensure Department of Defense (DoD) contractors and subcontractors adequately protect sensitive information (FCI and CUI) by streamlining requirements.
BCWHSBCWHS
2025-05-16

Plans, Policies, and Procedures: Clean Desk
Requires employees to clear their desks of all personal belongings and sensitive information when leaving their workstation, especially for extended periods.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: Clean Desk
Requires employees to clear their desks of all personal belongings and sensitive information when leaving their workstation, especially for extended periods.
BCWHSBCWHS
2025-05-16

Plans, Policies, and Procedures: Access Control
Defines who can access specific resources and under what conditions.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: Access Control
Defines who can access specific resources and under what conditions.
BCWHSBCWHS
2025-05-15

Plans, Policies, and Procedures: Acceptable Use
A set of rules and guidelines for using an organization's technology resources, including networks, websites, and other digital assets.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: Acceptable Use
A set of rules and guidelines for using an organization's technology resources, including networks, websites, and other digital assets.
N-gated Hacker Newsngate
2025-05-14

In a shocking twist, David Hilbert rises from the grave to address us via in 2014, only to be drowned out by the Mathematical Association of America's riveting and 🤯💤. Who knew the real challenge in math was navigating the endless sea of and contact lists? 🤷‍♂️📜
old.maa.org/press/periodicals/

BCWHSBCWHS
2025-05-13

Plans, Policies, and Procedures: CIS
The CIS Critical Security Controls are a prioritized set of CIS Safeguards to defend against the most prevalent cyber attacks against systems and networks.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: CIS
The CIS Critical Security Controls are a prioritized set of CIS Safeguards to defend against the most prevalent cyber attacks against systems and networks.
BCWHSBCWHS
2025-05-12

Plans, Policies, and Procedures: COBIT
Control Objectives for Information and Related Technologies, is a framework that helps businesses manage and govern their IT.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: COBIT
Control Objectives for Information and Related Technologies, is a framework that helps businesses manage and govern their IT.

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst