Sergio Ginocchio
  • Home
  • About
  • Cyber Security Operations and Leadership Program
    • Cyber Security Fundamentals >
      • Vulnerability Assessment
    • Cryptography >
      • Cryptographic Techniques for Network Security
    • Security Architecture
    • Operational Policy >
      • Summary of Major US and Industry Rules
      • Data Classification and Security Policy Models
      • Privacy Policy
    • Risk Management
    • Management and Cyber Security
    • Secure Software Design and Development
    • Network Visualization and Vulnerability Detection >
      • SIEM Tools Trade Study
      • Vulnerability Scanning Tools
      • Viewing Network Communications with Wireshark
    • Cyber Threat Intelligence
    • Cyber Incident Response and Computer Forensics
  • Reference Link Library
    • Major Industry Websites
    • Government Resources
    • Cybersecurity News
    • Cyber Security Tools >
      • Tools
    • Certification and Training
    • Books
    • Coursework Final Papers
  • Media Presentation
  • Home
  • About
  • Cyber Security Operations and Leadership Program
    • Cyber Security Fundamentals >
      • Vulnerability Assessment
    • Cryptography >
      • Cryptographic Techniques for Network Security
    • Security Architecture
    • Operational Policy >
      • Summary of Major US and Industry Rules
      • Data Classification and Security Policy Models
      • Privacy Policy
    • Risk Management
    • Management and Cyber Security
    • Secure Software Design and Development
    • Network Visualization and Vulnerability Detection >
      • SIEM Tools Trade Study
      • Vulnerability Scanning Tools
      • Viewing Network Communications with Wireshark
    • Cyber Threat Intelligence
    • Cyber Incident Response and Computer Forensics
  • Reference Link Library
    • Major Industry Websites
    • Government Resources
    • Cybersecurity News
    • Cyber Security Tools >
      • Tools
    • Certification and Training
    • Books
    • Coursework Final Papers
  • Media Presentation

Major Industry Websites


SANS
SANS is the most trusted and by far the largest source for information security training and security certification in the world. It also develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet's early warning system - the Internet Storm Center.

ISACA
ISACA (Previously known as the Information Systems Audit and Control Association, now goes by its acronym) is an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. ISACA serves a broad range of IT governance professionals.

Cloud Security Alliance
The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, certification, events and products.

CVE - Common Vulnerabilities and Exposure
CVE® is a list of entries—each containing an identification number, a description, and at least one public reference—for publicly known cybersecurity vulnerabilities. CVE Entries are used in numerous cybersecurity products and services from around the world, including the U.S. National Vulnerability Database (NVD)

(ISC)2 - International Information Systems Security Certification Consortium
Headquartered in the United States and with offices in London, Hong Kong and Tokyo, the International Information Systems Security Certification Consortium, Inc., (ISC)²®, is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers. We are recognized for Gold Standard certifications and world class education programs.


Center for Internet Security
The Center for Internet Security, Inc. (CIS) is a 501c3 nonprofit organization focused on enhancing the cyber security readiness and response of public and private sector entities, with a commitment to excellence through collaboration. CIS provides resources that help partners achieve security goals through expert guidance and cost-effective solutions.

National Cyber Security Centre
Britain launched the NCSC in February 2017 with a mission statement of making the UK the “safest place to live and do business online”. It’s part of GCHQ, and the website is an excellent resource for basic, intermediate and more advanced guidance on various cyber threats – plus how you can protect yourself and your business. It also publishes guidance on new cyber threats.

hhs.gov
Health Information Privacy provided by the Department of Health and Human Service. It provides links to HIPAA information for individual, professionals and covered entities.

Summary of the HIPAA Security Rule
This provides a summary of key elements of the Security Rule including who is covered, what information is protected, and what safeguards must be in place to ensure appropriate protection of electronic protected health information

Summary of the HIPAA Privacy Rule
The HIPAA Privacy Rule establishes national standards to protect individuals’ medical records and other personal health information and applies to health plans, health care clearinghouses, and those health care providers that conduct certain health care transactions electronically.

[1] cibernetika. (2018). Major industry websites. Retrieved from https://cibernetika.com/reference-link-library/major-industry-websites/