This Whitepapers section focuses on enterprise, business, and cybersecurity architecture topics. It presents a wide range of information for current and future architects in IT and cybersecurity.
This Whitepapers section focuses on compliance topics. Compliance is a broad area encompassing various focus areas, including contracts, regulations, standards, policies, and more. It presents a wide range of information for current and future cybersecurity leaders and professionals.
This Whitepapers section focuses on cybersecurity, information security, and information assurance and security. It presents a wide range of information for current and future cybersecurity leaders and professionals.
This Whitepapers section is focused on cybersecurity careers. It presents information for current and future cybersecurity, risk management, privacy, audit, and compliance professionals.
Anyone seeking a career path will find something relevant to their chosen profession. As more skills matrices are developed, a large amount of the content provided will be drawn from the Skills section.
This Whitepapers section is focused on cyber resilience. Cyber resilience encompasses various topic areas, including business continuity, crisis management, disaster recovery, emergency response, incident response, and pandemic preparedness.
This Whitepapers section is focused on enterprise risk management topics, including cybersecurity, vendor, third-party, and supply chain risks and risk management.
This section of Whitepapers is focused on leadership in general, including cybersecurity. Whitepaper topics follow the high-level concerns of cybersecurity leaders.
This section of Whitepapers is focused on domestic and international privacy. Topics will be representative of privacy and its impact on companies.
This Whitepapers section is focused on program and policy architectures. Program and policy architectures are essential to companies trying to achieve a base level of maturity within a programmatic view of delivery on related programs and service catalogs.
As a working cybersecurity professional, every attempt is made to separate professional and personal endeavors in a manner consistent with reducing conflicts of interest and maintaining ethics. Statements contained within this site are the explicit and implicit goals, objectives, endorsements, and educated opinion of the author of this site and not those of current or former employers.