ºÝºÝߣshows by User: infosecforce / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: infosecforce / Sat, 21 Jul 2018 20:13:48 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: infosecforce Cyber Security Command, Control, Communications, Computers Intelligence Surveillance and Reconnaissance (CS C4ISR) /slideshow/cyber-security-command-control-communications-computers-intelligence-surveillance-and-reconnaissance-cs-c4isr/106939628 whitepaperc4isr21uly2018-180721201348
Cyber C4ISR ]]>

Cyber C4ISR ]]>
Sat, 21 Jul 2018 20:13:48 GMT /slideshow/cyber-security-command-control-communications-computers-intelligence-surveillance-and-reconnaissance-cs-c4isr/106939628 infosecforce@slideshare.net(infosecforce) Cyber Security Command, Control, Communications, Computers Intelligence Surveillance and Reconnaissance (CS C4ISR) infosecforce Cyber C4ISR <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/whitepaperc4isr21uly2018-180721201348-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber C4ISR
Cyber Security Command, Control, Communications, Computers Intelligence Surveillance and Reconnaissance (CS C4ISR) from Bill Ross
]]>
639 5 https://cdn.slidesharecdn.com/ss_thumbnails/whitepaperc4isr21uly2018-180721201348-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber_Warfare_Escalation_to_Nuclear_Warfare_Examination /slideshow/cyberwarfareescalationtonuclearwarfareexamination/70600183 1c47a6f2-2034-4b1c-adfb-59a0bafba110-170102172344
]]>

]]>
Mon, 02 Jan 2017 17:23:44 GMT /slideshow/cyberwarfareescalationtonuclearwarfareexamination/70600183 infosecforce@slideshare.net(infosecforce) Cyber_Warfare_Escalation_to_Nuclear_Warfare_Examination infosecforce <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/1c47a6f2-2034-4b1c-adfb-59a0bafba110-170102172344-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Cyber_Warfare_Escalation_to_Nuclear_Warfare_Examination from Bill Ross
]]>
443 7 https://cdn.slidesharecdn.com/ss_thumbnails/1c47a6f2-2034-4b1c-adfb-59a0bafba110-170102172344-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber_Space_is_not_Cyber_Security /slideshow/cyberspaceisnotcybersecurity/64333100 358e5a5d-9ffc-4927-a32e-1a82b7f76761-160724210157
]]>

]]>
Sun, 24 Jul 2016 21:01:57 GMT /slideshow/cyberspaceisnotcybersecurity/64333100 infosecforce@slideshare.net(infosecforce) Cyber_Space_is_not_Cyber_Security infosecforce <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/358e5a5d-9ffc-4927-a32e-1a82b7f76761-160724210157-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Cyber_Space_is_not_Cyber_Security from Bill Ross
]]>
310 4 https://cdn.slidesharecdn.com/ss_thumbnails/358e5a5d-9ffc-4927-a32e-1a82b7f76761-160724210157-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Infosecforce security services /slideshow/infosecforce-security-services/50052298 infosecforcesecurityservices-150701140244-lva1-app6891
Security services aligned to the fundamental defense in depth precepts of predict, prevent, detect, respond.]]>

Security services aligned to the fundamental defense in depth precepts of predict, prevent, detect, respond.]]>
Wed, 01 Jul 2015 14:02:43 GMT /slideshow/infosecforce-security-services/50052298 infosecforce@slideshare.net(infosecforce) Infosecforce security services infosecforce Security services aligned to the fundamental defense in depth precepts of predict, prevent, detect, respond. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/infosecforcesecurityservices-150701140244-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Security services aligned to the fundamental defense in depth precepts of predict, prevent, detect, respond.
Infosecforce security services from Bill Ross
]]>
441 9 https://cdn.slidesharecdn.com/ss_thumbnails/infosecforcesecurityservices-150701140244-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Secure by design and secure software development /slideshow/secure-by-design-and-secure-software-development/50023024 securebydesignandsecuresoftwaredevelopment-150630204317-lva1-app6891
This secure lifecycle management process (SLCMP said slickum) defines the basic and most realistic way to develop secure software. While the briefing is a bit dated slide 34 is still a very relevant process. What is below the green line is the security dynamic process that happens supporting the basic development process seen above the green line. SLCMP is supported by building a complementary and excellent information risk framework system security plan or IRASSP. SLCMP is operationally deployed.]]>

This secure lifecycle management process (SLCMP said slickum) defines the basic and most realistic way to develop secure software. While the briefing is a bit dated slide 34 is still a very relevant process. What is below the green line is the security dynamic process that happens supporting the basic development process seen above the green line. SLCMP is supported by building a complementary and excellent information risk framework system security plan or IRASSP. SLCMP is operationally deployed.]]>
Tue, 30 Jun 2015 20:43:17 GMT /slideshow/secure-by-design-and-secure-software-development/50023024 infosecforce@slideshare.net(infosecforce) Secure by design and secure software development infosecforce This secure lifecycle management process (SLCMP said slickum) defines the basic and most realistic way to develop secure software. While the briefing is a bit dated slide 34 is still a very relevant process. What is below the green line is the security dynamic process that happens supporting the basic development process seen above the green line. SLCMP is supported by building a complementary and excellent information risk framework system security plan or IRASSP. SLCMP is operationally deployed. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securebydesignandsecuresoftwaredevelopment-150630204317-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This secure lifecycle management process (SLCMP said slickum) defines the basic and most realistic way to develop secure software. While the briefing is a bit dated slide 34 is still a very relevant process. What is below the green line is the security dynamic process that happens supporting the basic development process seen above the green line. SLCMP is supported by building a complementary and excellent information risk framework system security plan or IRASSP. SLCMP is operationally deployed.
Secure by design and secure software development from Bill Ross
]]>
1565 6 https://cdn.slidesharecdn.com/ss_thumbnails/securebydesignandsecuresoftwaredevelopment-150630204317-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
INFOSECFORCE Risk Management Framework Transition Plan /slideshow/infosecforce-continuous-monitoring-version-2/47305627 infosecforcecontinuousmonitoringversion2-150422155841-conversion-gate01
7 slide briefing showing the migration from DIACAP to the Risk Management Framework. It also shows the idea and synchronization between RMF and continuou monitoring. PCI should adopt this framework.]]>

7 slide briefing showing the migration from DIACAP to the Risk Management Framework. It also shows the idea and synchronization between RMF and continuou monitoring. PCI should adopt this framework.]]>
Wed, 22 Apr 2015 15:58:41 GMT /slideshow/infosecforce-continuous-monitoring-version-2/47305627 infosecforce@slideshare.net(infosecforce) INFOSECFORCE Risk Management Framework Transition Plan infosecforce 7 slide briefing showing the migration from DIACAP to the Risk Management Framework. It also shows the idea and synchronization between RMF and continuou monitoring. PCI should adopt this framework. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/infosecforcecontinuousmonitoringversion2-150422155841-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 7 slide briefing showing the migration from DIACAP to the Risk Management Framework. It also shows the idea and synchronization between RMF and continuou monitoring. PCI should adopt this framework.
INFOSECFORCE Risk Management Framework Transition Plan from Bill Ross
]]>
2043 7 https://cdn.slidesharecdn.com/ss_thumbnails/infosecforcecontinuousmonitoringversion2-150422155841-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security architecture analyses brief 21 april 2015 /slideshow/security-architecture-analyses-brief-21-april-2015/47305417 securityarchitectureanalysesbrief21april2015-150422155159-conversion-gate01
This brief defines problems with security architecture development, security architecture methodologies, and how to implement a security architecture briefing. This brief was created to define the themes stated in the INFOSECFORCE llc paper called the "Inviible Person ... the Security Architect"]]>

This brief defines problems with security architecture development, security architecture methodologies, and how to implement a security architecture briefing. This brief was created to define the themes stated in the INFOSECFORCE llc paper called the "Inviible Person ... the Security Architect"]]>
Wed, 22 Apr 2015 15:51:59 GMT /slideshow/security-architecture-analyses-brief-21-april-2015/47305417 infosecforce@slideshare.net(infosecforce) Security architecture analyses brief 21 april 2015 infosecforce This brief defines problems with security architecture development, security architecture methodologies, and how to implement a security architecture briefing. This brief was created to define the themes stated in the INFOSECFORCE llc paper called the "Inviible Person ... the Security Architect" <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securityarchitectureanalysesbrief21april2015-150422155159-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This brief defines problems with security architecture development, security architecture methodologies, and how to implement a security architecture briefing. This brief was created to define the themes stated in the INFOSECFORCE llc paper called the &quot;Inviible Person ... the Security Architect&quot;
Security architecture analyses brief 21 april 2015 from Bill Ross
]]>
1434 3 https://cdn.slidesharecdn.com/ss_thumbnails/securityarchitectureanalysesbrief21april2015-150422155159-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
INFOSECFORCE llc security services /infosecforce/infosecforce-llc-security-services infosecforcellcsecurityservices-150422154755-conversion-gate01
Master list of Cyber Security Services under the predict, prevent, detect, and respond model.]]>

Master list of Cyber Security Services under the predict, prevent, detect, and respond model.]]>
Wed, 22 Apr 2015 15:47:55 GMT /infosecforce/infosecforce-llc-security-services infosecforce@slideshare.net(infosecforce) INFOSECFORCE llc security services infosecforce Master list of Cyber Security Services under the predict, prevent, detect, and respond model. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/infosecforcellcsecurityservices-150422154755-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Master list of Cyber Security Services under the predict, prevent, detect, and respond model.
INFOSECFORCE llc security services from Bill Ross
]]>
597 1 https://cdn.slidesharecdn.com/ss_thumbnails/infosecforcellcsecurityservices-150422154755-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
" Soviet Military Doctrine ... a Blueprint for the Future or an Indictment of the Past " /slideshow/soviet-military-doctrine-mipb-jan-1991/42475120 sovietmilitarydoctrinemipbjan1991-141208094628-conversion-gate02
Extensive analyses of Soviet Military Doctrine written just before the collapse of the Soviet Union]]>

Extensive analyses of Soviet Military Doctrine written just before the collapse of the Soviet Union]]>
Mon, 08 Dec 2014 09:46:28 GMT /slideshow/soviet-military-doctrine-mipb-jan-1991/42475120 infosecforce@slideshare.net(infosecforce) " Soviet Military Doctrine ... a Blueprint for the Future or an Indictment of the Past " infosecforce Extensive analyses of Soviet Military Doctrine written just before the collapse of the Soviet Union <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sovietmilitarydoctrinemipbjan1991-141208094628-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Extensive analyses of Soviet Military Doctrine written just before the collapse of the Soviet Union
" Soviet Military Doctrine ... a Blueprint for the Future or an Indictment of the Past " from Bill Ross
]]>
344 1 https://cdn.slidesharecdn.com/ss_thumbnails/sovietmilitarydoctrinemipbjan1991-141208094628-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Intelligence Operations Center /slideshow/cyber-intelligence-operations-center/42164312 thecioc-141129125911-conversion-gate02
Replacing the Security Operations Center]]>

Replacing the Security Operations Center]]>
Sat, 29 Nov 2014 12:59:11 GMT /slideshow/cyber-intelligence-operations-center/42164312 infosecforce@slideshare.net(infosecforce) Cyber Intelligence Operations Center infosecforce Replacing the Security Operations Center <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/thecioc-141129125911-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Replacing the Security Operations Center
Cyber Intelligence Operations Center from Bill Ross
]]>
2878 4 https://cdn.slidesharecdn.com/ss_thumbnails/thecioc-141129125911-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
" The Invisible Person ... the Security Architect " /slideshow/the-invisible-person-08-21-2013/41869460 theinvisibleperson08212013-141121135557-conversion-gate01
Describes the problems of defining a security architect.]]>

Describes the problems of defining a security architect.]]>
Fri, 21 Nov 2014 13:55:57 GMT /slideshow/the-invisible-person-08-21-2013/41869460 infosecforce@slideshare.net(infosecforce) " The Invisible Person ... the Security Architect " infosecforce Describes the problems of defining a security architect. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/theinvisibleperson08212013-141121135557-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Describes the problems of defining a security architect.
" The Invisible Person ... the Security Architect " from Bill Ross
]]>
1627 8 https://cdn.slidesharecdn.com/ss_thumbnails/theinvisibleperson08212013-141121135557-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security Lifecycle Management Process /slideshow/security-lifecycle-management-process/12130497 slcmpout97format042610-13325127491271-phpapp02-120323093318-phpapp02
This is a NIST-based presentation on Web-Based threats and how to build decurity controls into the SDLC. Best to view in presentation mode.]]>

This is a NIST-based presentation on Web-Based threats and how to build decurity controls into the SDLC. Best to view in presentation mode.]]>
Fri, 23 Mar 2012 09:29:24 GMT /slideshow/security-lifecycle-management-process/12130497 infosecforce@slideshare.net(infosecforce) Security Lifecycle Management Process infosecforce This is a NIST-based presentation on Web-Based threats and how to build decurity controls into the SDLC. Best to view in presentation mode. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/slcmpout97format042610-13325127491271-phpapp02-120323093318-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is a NIST-based presentation on Web-Based threats and how to build decurity controls into the SDLC. Best to view in presentation mode.
Security Lifecycle Management Process from Bill Ross
]]>
4677 6 https://cdn.slidesharecdn.com/ss_thumbnails/slcmpout97format042610-13325127491271-phpapp02-120323093318-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-infosecforce-48x48.jpg?cb=1532204015 Cyber Security Journeyman that can build and implement numerous Cyber Security Solutions. Designed and implemented extensive enterprise and operational level Cyber Security solutions in the Department of Defense and private sector. Led teams as large as 100 people. Designed and executed extensive technical budgets up to $32 million dollars. Prior Air Force Combat Intelligence Officer with extensive operational experience (21 years active duty). Successes: Rebuilt the Federal Reserve Operational Cyber Security Program. Deployed JP Morgan’s first global Cyber Security Architecture and built the first Cyber Security program at Barnes and Noble.com. Multiple risk management local and... https://cdn.slidesharecdn.com/ss_thumbnails/whitepaperc4isr21uly2018-180721201348-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/cyber-security-command-control-communications-computers-intelligence-surveillance-and-reconnaissance-cs-c4isr/106939628 Cyber Security Command... https://cdn.slidesharecdn.com/ss_thumbnails/1c47a6f2-2034-4b1c-adfb-59a0bafba110-170102172344-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/cyberwarfareescalationtonuclearwarfareexamination/70600183 Cyber_Warfare_Escalati... https://cdn.slidesharecdn.com/ss_thumbnails/358e5a5d-9ffc-4927-a32e-1a82b7f76761-160724210157-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/cyberspaceisnotcybersecurity/64333100 Cyber_Space_is_not_Cyb...