Take an InfoSec awareness quiz to test your basic cybersecurity knowledge
Would like to know more on InfoSec Awareness…
Download a Security Risk Assessment steps paper!
Subscribe to DISC InfoSec blog by Email
InfoSec and Compliance – With 20 years of blogging experience, DISC InfoSec blog is dedicated to providing trusted insights and practical solutions for professionals and organizations navigating the evolving cybersecurity landscape. From cutting-edge threats to compliance strategies, this blog is your reliable resource for staying informed and secure. Dive into the content, connect with the community, and elevate your InfoSec expertise!
Jun 16 2020
Would like to know more on InfoSec Awareness…
Download a Security Risk Assessment steps paper!
Subscribe to DISC InfoSec blog by Email
Jun 16 2020
The publication of āVault 7ā cyber tools by WikiLeaks marked the largest data loss in agency history, a task force concluded.
The theft of top-secret computer hacking tools from the CIA in 2016 was the result of a workplace culture in which the agencyās elite computer hackers āprioritized building cyber weapons at the expense of securing their own systems,ā according to an internal report prepared for then-director Mike Pompeo as well as his deputy, Gina Haspel, now the current director.
Wikileaks Vault 7: What’s in the CIA Hacking Toolbox?
httpv://www.youtube.com/watch?v=X45Bb8O-gMI
CIA Hacking Tools Released in Wikileaks Vault 7 – Threat Wire
httpv://www.youtube.com/watch?v=5LYSjLwkAo4
Download a Security Risk Assessment steps paper!
Take an awareness quiz to test your basic cybersecurity knowledge
Subscribe to DISC InfoSec blog by Email
Jun 06 2020
As more people work from home due to COVID-19, cybersecurity operations are facing tremendous challenges. These five principles can helpĀ Chief Information Security Officers (CISOs) and cybersecurity leaders ensure effective business continuity in the “new normal.”
Source: 5 principles for effective cybersecurity leadership in a post-COVID world
7 Security Risks and Hacking Stories for Web Developers
httpv://www.youtube.com/watch?v=4YOpILi9Oxs
Download a Security Risk Assessment steps paper!
Subscribe to DISC InfoSec blog by Email
May 02 2020

[pdf-embedder url=”https://blog.deurainfosec.com/wp-content/uploads/2020/05/10-Steps-to-Cyber-Security.pdf” title=”10 Steps to Cyber Security”]
10 Steps to Cyber Security pdf

Free Download Cybersecurity For Dummies Cheat Sheet
10 steps to improve your online security and stop hackers
httpv://www.youtube.com/watch?v=H3XpuDN4Tsc
10 Steps To Becoming An Elite Cyber Security Pro Hacker
httpv://www.youtube.com/watch?v=YbUFjeHeY6A
Full Ethical Hacking Course – Network Penetration Testing for Beginners
httpv://www.youtube.com/watch?v=3Kq1MIfTWCE
Subscribe to DISC InfoSec blog by Email
Apr 27 2020

Open a PDF file The best practice guide for an effective infoSec function.
Guide to Developing a Cybersecurity Strategy & Roadmap
httpv://www.youtube.com/watch?v=TGPHB2wq-IQ
Subscribe to DISC InfoSec blog by Email
Apr 26 2020
Cyber Security Fundamentals: What is a Blue team?

Open a PDF file The best practice guide for an effective infoSec function.

Subscribe to DISC InfoSec blog by Email
Apr 26 2020

Open a PDF file The best practice guide for an effective infoSec function.
Introduction to Cybersecurity
httpv://www.youtube.com/watch?v=ULGILG-ZhO0
What You Should Learn Before Cybersecurity
Subscribe to DISC InfoSec blog by Email
Apr 25 2020
Preparing a Secure Evolution to 5G
[pdf-embedder url=”https://blog.deurainfosec.com/wp-content/uploads/2020/04/5G-CYBERSECURITY.pdf” title=”5G CYBERSECURITY”]
Tech Talk: 5G Security
httpv://www.youtube.com/watch?v=7ETDxh2d2sU
Security of 5G networks: EU Member States complete national risk assessments
httpv://www.youtube.com/watch?v=O_Jt9wp9FDc
Bye bye privacy with 5G
httpv://www.youtube.com/watch?v=a0359OG6CyY
Subscribe to DISC InfoSec blog by Email
Jan 03 2020
[pdf-embedder url=”https://blog.deurainfosec.com/wp-content/uploads/2020/01/WEF_Cybersecurity_Guide_for_Leaders.pdf”]
Open a PDF file The Cybersecurity Guide For Leaders in Todayās Digital World.
Annual Meeting on Cybersecurity 2019 | Enabling Leadership for a Secure Digital Future | World Economic Forum
Cybersecurity in a Digital World. The Future is Bright
httpv://www.youtube.com/watch?v=Tu1dkliqpHQ
Subscribe to DISC InfoSec blog by Email
Oct 16 2019
This report examines the general state of security within business today, exploring the hurdles that are preventing companies from an ideal security posture and suggesting the steps that can lead to improved security in the digital economy.
As the technology industry enters the next phase of maturity, there are more questions about the implications of emerging trends operating on a global scale. Aside from social impact ramification, utmost reliance on digital data and the sweeping collection of personal information are highlighting the critical nature of information security and privacy.
Digital Transformation: From AI and IoT to Cloud, Blockchain, and Cybersecurity | MIT PE
httpv://www.youtube.com/watch?v=NwwazhND9BA
Inside the CenturyLink Security Operations Center: Securing Your Digital Business
httpv://www.youtube.com/watch?v=_UyhYPOnNcY
The Convergence (and Divergence) of IT and OT Cyber Security
Subscribe to DISC InfoSec blog by Email
Oct 14 2019
The best practice guide for an effective infoSec function: iTnews has put together a bit of advice from various controls including ISO 27k and NIST CSF to guide you through whatās needed to build an effective information security management system (ISMS) within your organization.
This comprehensive report is a must-have reference for executives, senior managers and folks interested in the information security management area.
Open a PDF file The best practice guide for an effective infoSec function.
How to Build a Cybersecurity Program based on the NIST Cybersecurity Framework
httpv://www.youtube.com/watch?v=pDra0cy5WZI
Beginners ultimate guide to ISO 27001 Information Security Management Systems
httpv://www.youtube.com/watch?v=LytISQyhQVE
Conducting a cybersecurity risk assessment
Subscribe to DISC InfoSec blog by Email
Aug 18 2019

A View from the Front Lines of Cybersecurity
DISC InfoSec 🔒 securing the business 🔒 Learn more
Jul 25 2019
Protecting ControlledĀ Unclassified InformationĀ
CCPA: What You Need to Know About Californiaās New Privacy Law
DISCĀ helps business owners in California to meet the new 2018 requirements of the CCPA and how to implement the National Institute of Standards and Technologyās (NIST) 800-171 cybersecurity framework. The roadmap is provided specifically to the CCPA either for a business, agency or organization that is required to meet this new State Law and describes both technical and administrative measures that will attain an acceptable level of compliance for State certifying officials.Ā Assessment will include but not limited to compliance with policies and procedures, security strategy/plan, and plan of actions & milestones.Ā The initial assessment will determine the as-is state of your data privacy program business, legal and regulatory requirements.Ā DISCĀ will provide a target state (to-be) which will include tech controls, mgmt. control, and ops control to build your data privacy program based on NIST 800-171. So basically the transition plan (roadmap) will enumerate the details of how to get from as-is state to to-be state.
DISCĀ Cybersecurity consultant support business and agencies effectively to meet the 110 security controls in NIST 800-171 which has become the de facto standard for cybersecurity compliance. It ensures that security policies and practices of the framework meet the intent of CCPA. Adequate security is defined by ācomplianceā with the 110 NIST 800-171 security controls.
Jul 19 2019

The Small Business Cybersecurity Assistance Act may provide business owners with access to government-level tools to secure small business against attacks.
Source: The Problem With the Small Business Cybersecurity Assistance Act
The House passes Small Business Administration (SBA) Cyber Awareness Act (H.R. 2331), which requires the SBA to expand its ability to combat cyber threats.
Source: Small Business Cybersecurity: House Passes Key Bill – MSSP Alert
Mar 29 2019
Mar 04 2019
The workforce and skills gap in cybersecurity continues to plague organizations.
Source: RSAC 2019: 58% of Orgs Have Unfilled Cyber Positions | Threatpost
Mar 02 2019
Cyber Defense Magazine October 2018 Edition has arrived. MARCH 2019 EDITION (RSA CONFERENCE PRINT EDITION & E-MAG COMING NEXT WEEK)
Source: Cyber Defense Magazine – March 2019 has arrived. Enjoy it!
Feb 17 2019
A researcher has discovered a serious vulnerability in Xiaomi electric scooters. Exploiting the flaw could allow remote attacks on it causing sudden breaks.
Source: Vulnerability In Xiaomi Electric Scooters Could Allow Remote Attacks
ā Grab this Headline Animator
Feb 03 2019
Personal data is a precious commodity but sometimes we can share too much? Rob thinks we need to develop our human firewall in an age where some much of our lives is online. Rob May is chairman of IoD Surrey, an award-winning entrepreneur and Managing Director of ramsac limited.
Rob makes complex subjects straightforward by using real life examples, humor and pragmatism. He is passionate about his work, positive about life and committed to helping people understand and grow.
He lives with his wife and children in Horsell and is very much a part of the local community. This talk was given at a TEDx event using the TED conference format but independently organized by a local community.