#procedures

BCWHSBCWHS
2025-05-29

Plans, Policies, and Procedures: Information Security
Documented set of policies, objectives, systems, and processes that an organization uses to protect sensitive data and critical resources.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: Information Security
Documented set of policies, objectives, systems, and processes that an organization uses to protect sensitive data and critical resources.
BCWHSBCWHS
2025-05-28

Plans, Policies, and Procedures: High-Risk User
High-risk users are the top users in an organization who have had at least one instance of risky behavior, or events.
blackcatwhitehatsecurity.com
-Risk

Plans, Policies, and Procedures: High-Risk User
High-risk users are the top users in an organization who have had at least one instance of risky behavior, or events.
BCWHSBCWHS
2025-05-28

Plans, Policies, and Procedures: Identification and Authentication
Defines how an organization establishes and verifies a user's identity for access to systems and resources.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: Identification and Authentication
Defines how an organization establishes and verifies a user's identity for access to systems and resources.
BCWHSBCWHS
2025-05-27

Plans, Policies, and Procedures: Guest Access
Defines how external individuals can access and interact with an organization's resources and systems.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: Guest Access
Defines how external individuals can access and interact with an organization's resources and systems.
BCWHSBCWHS
2025-05-26

Plans, Policies, and Procedures: Gramm-Leach-Bliley Act (GLBA)
A federal law that requires financial institutions to explain their information-sharing practices to customers and to safeguard sensitive data.
blackcatwhitehatsecurity.com
-Leach-Bliley

Plans, Policies, and Procedures: Gramm-Leach-Bliley Act (GLBA)
A federal law that requires financial institutions to explain their information-sharing practices to customers and to safeguard sensitive data.
BCWHSBCWHS
2025-05-25

Plans, Policies, and Procedures: FedRAMP
A government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services used by federal agencies.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: FedRAMP
A government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services used by federal agencies.
BCWHSBCWHS
2025-05-23

Plans, Policies, and Procedures: Equipment Disposal
Outlines the procedures for responsibly managing assets that are no longer needed, ensuring proper data sanitization, and adhering to legal and environmental regulations.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: Equipment Disposal
Outlines the procedures for responsibly managing assets that are no longer needed, ensuring proper data sanitization, and adhering to legal and environmental regulations.
BCWHSBCWHS
2025-05-22

Plans, Policies, and Procedures: Encryption
A set of guidelines that an organization uses to manage and control the encryption of its data, ensuring its confidentiality and integrity.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: Encryption
A set of guidelines that an organization uses to manage and control the encryption of its data, ensuring its confidentiality and integrity.
BCWHSBCWHS
2025-05-21

Plans, Policies, and Procedures: Disaster and Recovery
An approach that outlines procedures and tools to restore critical IT systems, data, and operations after a disruption, ensuring business continuity and minimizing downtime.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: Disaster and Recovery
An approach that outlines procedures and tools to restore critical IT systems, data, and operations after a disruption, ensuring business continuity and minimizing downtime.
BCWHSBCWHS
2025-05-20

Plans, Policies, and Procedures: Digital Operational Resilience Act (DORA)
An EU regulation aimed at strengthening the digital operational resilience of the financial sector.
blackcatwhitehatsecurity.com
#(DORA)

Plans, Policies, and Procedures: Digital Operational Resilience Act (DORA)
An EU regulation aimed at strengthening the digital operational resilience of the financial sector.
BCWHSBCWHS
2025-05-19

Plans, Policies, and Procedures: COSO
An organization that develops guidelines for businesses to evaluate internal controls, risk management, and fraud deterrence.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: COSO
An organization that develops guidelines for businesses to evaluate internal controls, risk management, and fraud deterrence.
BCWHSBCWHS
2025-05-17

Plans, Policies, and Procedures: CMMC 2.0
A revised program designed to ensure Department of Defense (DoD) contractors and subcontractors adequately protect sensitive information (FCI and CUI) by streamlining requirements.
blackcatwhitehatsecurity.com
#2.0

Plans, Policies, and Procedures: CMMC 2.0
A revised program designed to ensure Department of Defense (DoD) contractors and subcontractors adequately protect sensitive information (FCI and CUI) by streamlining requirements.
BCWHSBCWHS
2025-05-16

Plans, Policies, and Procedures: Clean Desk
Requires employees to clear their desks of all personal belongings and sensitive information when leaving their workstation, especially for extended periods.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: Clean Desk
Requires employees to clear their desks of all personal belongings and sensitive information when leaving their workstation, especially for extended periods.
BCWHSBCWHS
2025-05-16

Plans, Policies, and Procedures: Access Control
Defines who can access specific resources and under what conditions.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: Access Control
Defines who can access specific resources and under what conditions.
BCWHSBCWHS
2025-05-15

Plans, Policies, and Procedures: Acceptable Use
A set of rules and guidelines for using an organization's technology resources, including networks, websites, and other digital assets.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: Acceptable Use
A set of rules and guidelines for using an organization's technology resources, including networks, websites, and other digital assets.
N-gated Hacker Newsngate
2025-05-14

In a shocking twist, David Hilbert rises from the grave to address us via in 2014, only to be drowned out by the Mathematical Association of America's riveting and 🤯💤. Who knew the real challenge in math was navigating the endless sea of and contact lists? 🤷‍♂️📜
old.maa.org/press/periodicals/

BCWHSBCWHS
2025-05-13

Plans, Policies, and Procedures: CIS
The CIS Critical Security Controls are a prioritized set of CIS Safeguards to defend against the most prevalent cyber attacks against systems and networks.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: CIS
The CIS Critical Security Controls are a prioritized set of CIS Safeguards to defend against the most prevalent cyber attacks against systems and networks.
BCWHSBCWHS
2025-05-12

Plans, Policies, and Procedures: COBIT
Control Objectives for Information and Related Technologies, is a framework that helps businesses manage and govern their IT.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: COBIT
Control Objectives for Information and Related Technologies, is a framework that helps businesses manage and govern their IT.
BCWHSBCWHS
2025-05-11

Plans, Policies, and Procedures: CISA SCuBA Gear M365
The Secure Cloud Business Applications (SCuBA) project provides guidance and capabilities to secure agencies’ cloud business application environments and protect federal information that is created, accessed, shared and stored in those environments.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: CISA SCuBA Gear M365
The Secure Cloud Business Applications (SCuBA) project provides guidance and capabilities to secure agencies’ cloud business application environments and protect federal information that is created, accessed, shared and stored in those environments.
BCWHSBCWHS
2025-05-10

Plans, Policies, and Procedures: Cloud Controls Matrix
The controls framework is aligned to the CSA Security Guidance for Cloud Computing, and is considered a de-facto standard for cloud security assurance and compliance.
blackcatwhitehatsecurity.com

Plans, Policies, and Procedures: Cloud Controls Matrix
The controls framework is aligned to the CSA Security Guidance for Cloud Computing, and is considered a de-facto standard for cloud security assurance and compliance.

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst