<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
  <channel>
    <atom:link href="http://isc2chapter-southflorida.org/page-18081/BlogPost/4944367/RSS" rel="self" type="application/rss+xml" />
    <title>(ISC)² South Florida Chapter Untitled page</title>
    <link>https://isc2chapter-southflorida.org/</link>
    <description>(ISC)² South Florida Chapter blog posts</description>
    <dc:creator>(ISC)&amp;#178; South Florida Chapter</dc:creator>
    <generator>Wild Apricot - membership management software and more</generator>
    <language>en</language>
    <pubDate>Wed, 08 Apr 2026 22:14:56 GMT</pubDate>
    <lastBuildDate>Wed, 08 Apr 2026 22:14:56 GMT</lastBuildDate>
    <item>
      <pubDate>Tue, 25 Jul 2023 13:49:57 GMT</pubDate>
      <title>ISC2 South Florida Chapter at 2023 Cybersecurity Sympoisium!</title>
      <description>&lt;p&gt;Calling all South Florida Cybersecurity Professionals! Come meet and network at the 2023 Cybersecurity Symposium!&lt;/p&gt;

&lt;p&gt;&lt;span data-slate-fragment="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"&gt;Join cybersecurity leaders from across South Florida, along with our law enforcement partners from across local, state and federal agencies to meet, discuss current trends and topics in cybersecurity, and learn about the critical resources that exist across our region to benefit all organizations, public and private, to confront the cybersecurity challenges we all face.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;The ISC2 South Florida Chapter will be joining this great event to help foster better connections, information sharing and promote the message of collaboration throughout our region.&amp;nbsp; Cybersecurity is a concern for everyone, and this Cybersecurity Symposium will aim to help raise awareness and help strengthen our preparedness and response capabilities across our entire South Florida Community.&lt;/p&gt;

&lt;p&gt;We hope to see you there!&lt;/p&gt;

&lt;p&gt;Register on Eventbrite for your free tickets!&lt;/p&gt;

&lt;p&gt;&lt;span style="background-color: rgb(255, 255, 255);"&gt;&lt;font style="font-size: 14px;" color="#39364F" face="Neue Plak, -apple-system, BlinkMacSystemFont, Roboto, Helvetica Neue, Helvetica, Tahoma, Arial, sans-serif"&gt;https://SERDSTFCyber23.eventbrite.com&lt;/font&gt;&lt;/span&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://isc2chapter-southflorida.org/page-18081/13231951</link>
      <guid>https://isc2chapter-southflorida.org/page-18081/13231951</guid>
      <dc:creator>Frank Martinez</dc:creator>
    </item>
    <item>
      <pubDate>Tue, 02 Mar 2021 12:00:02 GMT</pubDate>
      <title>Certifications to Know for Cyber Security</title>
      <description>&lt;p style="line-height: 22px;"&gt;&lt;font style="font-size: 21px;" color="#000000" face="Times New Roman"&gt;Certifications To Know For Cyber Security&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font style="font-size: 21px;" color="#000000" face="Times New Roman"&gt;&lt;strong&gt;&lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 11px;"&gt;(By reciprocity labs for the (ISC)2 Miami Chapter)&lt;/font&gt;&lt;/strong&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman"&gt;Cybercrime is an ever-present threat for businesses operating in the current technological landscape. Global losses from cybercrime nearly reached $1 trillion in 2020, forcing small and big companies to ramp up their cybersecurity efforts. Companies can shield themselves from cyber threats by hiring cybersecurity professionals to protect their digital data and resources. If you work in IT, cybersecurity certifications can earn you a salary raise, promotion, or a better job. The most in-demand cybersecurity certifications include:&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font style="font-size: 19px;" color="#000000" face="Times New Roman"&gt;1. Certified Ethical Hacker&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman"&gt;Hackers are always devising new tactics to launch attacks, which makes it challenging to defeat them. Your best bet against opportunistic hackers is ethical hackers who think like their black hat counterparts. An ethical hacker will penetrate computer systems to seek out vulnerabilities and apply preventative countermeasures.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman"&gt;The EC-Council provides the Certified Ethical Hacker (CEH) certification. The credential equips IT professionals to identify hacking practices and prevent cyber-attacks. CEH topics include:&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Vulnerability analysis to identify security gaps in a company’s digital infrastructure&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Malware analysis to detect different kinds of malware&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;System hacking methodologies&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman"&gt;The EC-Council has options for self-study, instructor-led training, and video lectures. According to Payscale, IT experts who are certified ethical hackers can seek penetration jobs, where the average salary is $85,615.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font style="font-size: 19px;" color="#000000" face="Times New Roman"&gt;2. Certified Information Security Manager (CISM)&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman"&gt;The CISM certification is reputed as one of the best credentials for information security management professionals. The non-profit, independent association ISACA provides it for experts in information security, governance, and risk management. The certification is ideal for information security managers and IT consultants who oversee infosec program management. You can expect to learn:&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Risk management&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Information security governance&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Information security management&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Response management&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Information security program management&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman"&gt;An aspirant for CISM requires a minimum of five years in cybersecurity. CISM holders commonly apply for a CISO title, which has an average annual salary of $164,936, according to Payscale.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font style="font-size: 19px;" color="#000000" face="Times New Roman"&gt;3. CompTIA Security+&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman"&gt;If you are new to cybersecurity, the CompTIA Security+ certification will take you through general IT security concepts. Cybersecurity has become&lt;/font&gt;&lt;a href="https://reciprocitylabs.com/resources/why-is-cybersecurity-important/"&gt;&lt;font style="font-size: 16px;" color="#0563C1" face="Times New Roman"&gt;more urgent than ever,&lt;/font&gt;&lt;/a&gt; &lt;font style="font-size: 16px;" color="#000000" face="Times New Roman"&gt;and IT professionals need to protect systems, hardware, and software. You will gain the skills to assess security systems, recommend improvements, monitor and protect hybrid environments such as the cloud, and respond to security incidents. Other concepts covered by CompTIA Security+ include:&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Encryption standards&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Disaster recovery and business continuity&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Network threats and defenses&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Elements of successful security practices&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman"&gt;This certification offers a springboard for various IT security jobs, including network administrator, security engineer, systems administrator, junior IT auditor, and security consultant.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font style="font-size: 19px;" color="#000000" face="Times New Roman"&gt;4. Certified Information System Security Professional (CISSP)&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman"&gt;CISSP is among the most sought-after cybersecurity certifications. The (ISC)2 gives this advanced-level credential for cybersecurity analysts who want standardized knowledge in the field. The CISSP exam takes six hours, and it consists of 250 questions in multiple areas, including:&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Access control systems&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Physical security&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Security management practices&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Telecommunications and networking security&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Business continuity planning&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Cryptography&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Professional ethics&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman"&gt;Earning a CISSP accreditation will show that you can design, implement, and oversee a first-class cybersecurity program. The certification will equip you for careers like security manager, security analyst, and technical security officer.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font style="font-size: 19px;" color="#000000" face="Times New Roman"&gt;5. Certified Information Systems Auditor (CISA&lt;/font&gt;&lt;font style="font-size: 19px;" color="#000000" face="Times New Roman"&gt;)&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman"&gt;A CISA certification will prove your expertise in IT auditing, control, and security. Like CISM, CISA requires five years' experience for aspiring IT auditors. CISA IT experts are tasked with securing and maintaining an organization’s critical assets. You will also learn:&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Auditing process for information systems&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Management and governance of IT&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Protection of information assets&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Business resilience&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman"&gt;According to Payscale, CISA experts earn an average salary of $103,043.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font style="font-size: 19px;" color="#000000" face="Times New Roman"&gt;6. Certified Cloud Security Professional (CCSP)&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman"&gt;Traditional monitoring tools are not adequate for the cloud, and there is a need for IT experts to understand cloud security design and operations. CCSP is the leading cloud security certification for IT professionals involved with the cloud. You will learn:&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Cloud data security&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Cloud concepts, design, and architecture&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Cloud application security&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Legal, risk, and compliance&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Cloud security operations&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman"&gt;Aspirants must have at least 5-years’ IT experience in a cloud environment. The CCSP will prepare you for roles like security architect, enterprise architect, security administrator, and systems architect.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font style="font-size: 19px;" color="#000000" face="Times New Roman"&gt;7. Computer Hacking Forensic Investigator (CHFI)&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman"&gt;Ransomware attacks are increasing by over 350% annually, resulting in damages worth billions of dollars. Organizations need to have the capabilities to extract evidence in case of cyberattacks and conduct audits to discourage subsequent attacks. The CHFI certification provides participants with the skills to undertake an effective digital forensics investigation. A CHFI expert will be able to:&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Perform computer forensics&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Examine and analyze digital images, text, graphics, and multimedia&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Perform a thorough analysis of electronic data storage media such as computer hard drives&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Generate and maintain an audit trail that will support an investigation&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&lt;font style="font-size: 16px;" face="Times New Roman" color="#000000"&gt;Analyze all response activities linked to cyber incidents&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font style="font-size: 19px;" color="#000000" face="Times New Roman"&gt;Conclusion&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman"&gt;IT professionals with cybersecurity certifications are in high demand, given the increasing threat of cyber-attacks. These certifications will equip your IT staff to detect, prevent, and analyze cybersecurity events. The credentials will also advance the careers of IT professionals, with perks that include better pay and opportunities.&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;&lt;br&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Arial"&gt;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;&lt;br&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://isc2chapter-southflorida.org/page-18081/10154745</link>
      <guid>https://isc2chapter-southflorida.org/page-18081/10154745</guid>
      <dc:creator>Arturo Santos</dc:creator>
    </item>
    <item>
      <pubDate>Fri, 19 Feb 2021 20:22:09 GMT</pubDate>
      <title>Careers in Cyber Security</title>
      <description>&lt;p&gt;&lt;strong&gt;&lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 21px;"&gt;Careers In Cybersecurity&amp;nbsp;&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 11px;"&gt;(By reciprocity labs for the (ISC)2 Miami Chapter)&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 16px;"&gt;A report&amp;nbsp;&lt;/font&gt;&lt;font face="Times New Roman, serif" style="font-size: 16px;"&gt;published by the Identity Theft Resource Cent&lt;font color="#0E101A"&gt;er shows that the number of data breaches in the U.S. as of 2017 stood at over 1,500, up by 45% from 2016. It is no wonder the number of cybersecurity jobs is set to increase. Here are some of the top careers in cybersecurity you should consider.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 19px;"&gt;1. Security Software Developer&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 16px;"&gt;A security software developer is involved in building security software. These developers also integrate security in applications software during the development and design phase. A security software developer is charged with supervising developers and guiding them in the production of security software applications.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 16px;"&gt;The professional should also be involved from the inception of software systems until the software is made available to customers. Security software developers should also test their final products for weaknesses and come up with solutions to address these vulnerabilities.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 19px;"&gt;2. Ethical Hackers&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 16px;"&gt;Ethical hackers have a CEH certificate and will infiltrate the security of a business to simulate the behavior of hackers. An ethical hacker usually adopts the same methods used by black hat hackers to determine the strength of a company’s security standards. An ethical hacker is also involved with upgrading a company’s existing security protocols.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 19px;"&gt;3. Computer Forensics Analysts&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 16px;"&gt;A forensic analyst deals with cyber-crime. This professional liaises with law enforcement agencies to perform different tasks. These include:&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;●&lt;font face="Times New Roman" style="font-size: 9px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 16px;"&gt;Recovering deleted information&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;●&lt;font face="Times New Roman" style="font-size: 9px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 16px;"&gt;Interpreting criminal-related information&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;●&lt;font face="Times New Roman" style="font-size: 9px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 16px;"&gt;Following data trails&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;●&lt;font face="Times New Roman" style="font-size: 9px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 16px;"&gt;Analyzing phone records&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 16px;"&gt;A computer forensic analyst needs to provide a report on their assessment. Their reports may act as evidence in court cases.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 19px;"&gt;4. Penetration Tester&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 16px;"&gt;Penetration testing involves the use of testing methods on a computer system to determine any vulnerability. Like an ethical hacker, a penetration tester will try to hack into an organization to discover any vulnerabilities and problems. Penetration testers use different tools to hack into a business’s system. They are also required to provide a report of their findings.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 19px;"&gt;5. Security Architect Career Path&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 16px;"&gt;These professionals deal with creating, building, and executing, computer and network security for a business. This position requires high problem-solving skills. A security architect will develop a complex security framework and test its effectiveness. A security architect designs systems that guarantee&lt;/font&gt; &lt;u&gt;&lt;a href="https://reciprocitylabs.com/resources/why-is-cloud-security-important/" target="_blank"&gt;&lt;font color="#4A6EE0" face="Times New Roman, serif" style="font-size: 16px;"&gt;&lt;font color="#4A6EE0"&gt;cloud security&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;/u&gt;&lt;font face="Times New Roman, serif" style="font-size: 16px;"&gt;.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Times New Roman, serif" style="font-size: 16px;"&gt;Although cloud solutions may be convenient, they make you vulnerable to many security threats. This is why a security architect helps businesses integrate cloud security in their disaster recovery and risk management plans. Their frameworks address online security threats such as DDoS attacks, malware, and viruses.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 19px;"&gt;6. Chief Information Security Officer&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 16px;"&gt;The Chief Information Security Officer deals with managing the operations of a business’s IT security department. The professional deals with planning, coordinating, and managing an organization’s computer, network, and data security needs. The CISO is also charged with recruiting staff of security personnel. This role requires a good knowledge of IT security architecture.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 19px;"&gt;7. IT Security Consultant&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 16px;"&gt;IT security executives liaise with clients and instruct them on the best way to maintain high cybersecurity standards. These professionals are in demand among smaller agencies that do not have the staff to handle their security issues. They may also work to reinforce the security teams of large organizations.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 19px;"&gt;8. Security Systems Administrator&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 16px;"&gt;A security systems administrator deals with installing, administering, and maintaining computer, network, and security systems. The security systems administrator is in charge of tasks such as backing up data, setting up and maintaining user accounts, and systems monitoring. The professional is also concerned with the formation of organizational security protocols.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 19px;"&gt;9. Information Security Analyst&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 16px;"&gt;An information security analyst is mainly concerned with protecting networks. These professionals set up firewalls and encryption to protect a company against breaches. The analyst will also monitor and audit a business’ system for unusual behavior.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 19px;"&gt;In Conclusion&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Times New Roman, serif" style="font-size: 16px;"&gt;There is a world of opportunity for any person willing to join the broad field of cybersecurity. With the rise of cybercrime, it is becoming essential for many organizations to hire cybersecurity personnel to keep their systems and data safe. Many businesses have found the need to hire penetration testers to fix vulnerabilities in their systems, malware analysts to find malicious programs, security systems administrators to ensure effective security protocols are in place, and other cybersecurity officials. Therefore, this is a lucrative career path for anyone who wants to contribute to the world of cybersecurity.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://isc2chapter-southflorida.org/page-18081/10117573</link>
      <guid>https://isc2chapter-southflorida.org/page-18081/10117573</guid>
      <dc:creator>Arturo Santos</dc:creator>
    </item>
    <item>
      <pubDate>Fri, 15 May 2020 15:51:40 GMT</pubDate>
      <title>Business Associates in the Digital Healthcare World</title>
      <description>&lt;p data-pm-slice="0 0 []"&gt;Technological innovation in healthcare continues to rise as healthcare organizations take advantage of emerging technologies to deliver their services to patients. With this push for a digital healthcare experience, the healthcare startup market has skyrocketed over the past few years. According to&amp;nbsp;&lt;a href="https://rockhealth.com/reports/amidst-a-record-3-1b-funding-in-q1-2020-digital-health-braces-for-covid-19-impact/"&gt;Rock Health&lt;/a&gt;, digital health venture funding had a record start in 2020, with $3.1B invested early in Q1 2020. While the global pandemic has dramatically altered everyone's lives and every sector, the innovation to combat this pandemic and shift how healthcare services are delivered has been inspiring to see.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Healthcare organizations or HIPAA (Health Insurance Portability and Accountability Act) covered entities will continue to partner with these startups and other organizations to digitally deliver their services to patients. This partnership is captured in an agreement known as business associate agreements (BAAs) between the covered entity and the organization providing functions or activities that requires access to PHI, also known as a business associate.&lt;/p&gt;

&lt;p&gt;It is often misunderstood who is exactly considered a HIPAA business associate. For those organizations that are classified as a business associate, are they required to comply with HIPAA Security, Privacy and Breach Notification Rules? Does the covered entity or healthcare organization have any requirements to verify their compliance?&lt;/p&gt;

&lt;p&gt;I am not a lawyer, and I am not intending to give legal advice on the HIPAA law. However, I hope this article will help you better understand business associates and their role in healthcare security. Understanding the requirements associated with being a business associate will help covered entities and business associates protect themselves from HIPAA fines.&lt;/p&gt;

&lt;h3&gt;WHAT IS A BUSINESS ASSOCIATE?&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.hhs.gov/hipaa/for-professionals/privacy/guidance/business-associates/index.html"&gt;According to the U.S. Department of Health and Human Services (HHS)&lt;/a&gt;, a business associate is a person or entity that performs certain functions or activities that involve the use or disclosure of protected health information (PHI) on behalf of or provide services to, a covered entity.&lt;/p&gt;

&lt;p&gt;In simpler terms, a business associate is a vendor or subcontractor that has access to PHI. Some examples of potential business associates are:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;Cloud service provider i.e.&amp;nbsp;&lt;a href="https://aws.amazon.com/blogs/security/accept-a-baa-with-aws-for-all-accounts-in-your-organization/"&gt;Amazon Web Services&lt;/a&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;Software companies that may be exposed to or use PHI&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;providers of data transmission services, portals, or other interfaces created on behalf of Covered Entities that allow patients to share their data with the Covered Entity&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;data storage (it does not matter if the PHI can be viewed or is encrypted&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;&lt;a href="https://www.lawtechnologytoday.org/2015/04/lawyers-as-business-consultants-under-hipaa-how-to-stay-compliant/"&gt;Law firms&lt;/a&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;External auditors or accountants&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;Answering Services&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;e-prescribing services&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;Marketing firms&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Healthcare-related organizations such as healthcare providers, insurance companies, pharmacies, healthcare clearinghouses, or nursing homes need business associates to provide their services. Presenting a huge opportunity for those organizations that are considered business associates to engage in business with these healthcare organizations.&lt;/p&gt;

&lt;h3&gt;BUSINESS ASSOCIATE IMPACTS ON SECURITY&lt;/h3&gt;

&lt;p&gt;In the interconnected healthcare digital world, business associates present a significant risk to the confidentiality, integrity, and availability of PHI. This is why business associates are&amp;nbsp;&lt;a href="https://www.hhs.gov/hipaa/for-professionals/privacy/guidance/business-associates/factsheet/index.html"&gt;directly liable for certain requirements of the HIPAA Rules&lt;/a&gt;. A few&amp;nbsp;&lt;a href="https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf"&gt;examples of recent business associate&lt;/a&gt;&amp;nbsp;HIPAA violations are listed below:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href="https://www.hawaiipacifichealth.org/privacy-incident"&gt;Hawaii Pacific Health&lt;/a&gt;&amp;nbsp;experienced a breach where patient records were inappropriately accessed by a former employee of one of their partners&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;&lt;a href="https://www.databreaches.net/an-old-hipaa-incident-rears-its-very-ugly-head-again/"&gt;Surefile&lt;/a&gt;, a record storage firm, reported a Hacking/IT incident to the department of HHS that could have impacted close to 1 million records according to the individual reporting the breach&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;&lt;a href="https://www.databreaches.net/data-breach-potentially-impacts-hundreds-of-brunswick-county-schools-employees/"&gt;Interactive Medical Systems&lt;/a&gt;&amp;nbsp;reported a Hacking/IT incident to HHS that could have impacted over 15,000 individuals&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;&lt;a href="https://www.modernhealthcare.com/cybersecurity/august-reported-healthcare-breaches-exposed-700000-peoples-data"&gt;SOLO Laboratories&lt;/a&gt;&amp;nbsp;reported a Hacking/IT incident of a network server that impacted over 60,000 individuals.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;As required by section 13402(e)(4) of the HITECH Act, the HHS Secretary posts a list of covered entity and business associate breaches of unsecured protected health information affecting 500 or more individuals on their breach portal&amp;nbsp;&lt;a href="https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf"&gt;here&lt;/a&gt;. Business associates are important because similar to covered entities they have obligations under the HIPAA law.&lt;br&gt;&lt;/p&gt;

&lt;h3&gt;OK, I AM A BUSINESS ASSOCIATE, NOW WHAT?&lt;/h3&gt;

&lt;p&gt;The HIPAA Privacy Rule allows healthcare organizations (covered entities) to disclose PHI to business associates as long as they obtain satisfactory assurances that the business associate will use the information only for the purposes for which it was engaged by the covered entity, will safeguard the information from misuse, and will help the covered entity comply with some of the covered entity’s duties under the Privacy Rule (&lt;a href="https://www.hhs.gov/hipaa/for-professionals/privacy/guidance/business-associates/index.html"&gt;HHS&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;The satisfactory assurances must be in writing and are captured in a business associate agreement or BAA. BAA's are required to list the obligations of the business associate and what the business associate is agreeing to. A few examples of some of these obligations that are included in a BAA are:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;Protecting PHI&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;Training Employees&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;Breach Notification&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;Subcontractor provisions to protect PHI&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;Return or Destroy Information&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Signing an agreement with a customer means you are now responsible to execute those obligations outlined in the agreement. Being a business associate and signing a BAA means that you are now liable for civil and criminal penalties for non-compliance with HIPAA regulations as outlined in the&amp;nbsp;&lt;a href="https://www.govinfo.gov/content/pkg/FR-2013-01-25/pdf/2013-01073.pdf"&gt;HIPAA Omnibus Rule and HITECH Act&lt;/a&gt;. HHS has published&amp;nbsp;&lt;a href="https://www.hhs.gov/hipaa/for-professionals/covered-entities/sample-business-associate-agreement-provisions/index.html"&gt;sample business associate agreement&lt;/a&gt;&amp;nbsp;provisions to help organizations draft these contracts.&lt;/p&gt;

&lt;p&gt;While this sounds like a hassle and a lot of work, there are benefits to being a business associate. Pricing compliance with HIPAA Rules helps you protect your customers and your data, as well as differentiates your organization from your competitors.&lt;/p&gt;

&lt;p&gt;Beyond signing a BAA, organizations often undergo assessments to prove to third parties that they are compliance with the HIPAA Rules. Proving to covered entities or other third parties your compliance with HIPAA often requires a third-party to assess your organization to identify the administrative, physical and technical safeguards implemented and operating effectively at your organization. It is important to note that HIPAA is enforced by the Office of Civil Rights (OCR). HHS does not endorse a HIPAA certification or compliance assessment or firm. However, proving to the OCR or to customers that you have implemented the necessary safeguards to comply with the HIPAA Rules is best accomplished by being evaluated by an independent, third-party auditor.&lt;/p&gt;

&lt;h3&gt;CONCLUSION&lt;/h3&gt;

&lt;p&gt;Business associates are vital components of the healthcare ecosystem assisting healthcare providers and other covered entities to deliver their critical services to patients. Healthcare technology startups, along with other business associates and covered entities, will play a huge role in helping the world recover from COVID-19. Understanding the requirements for business associates will ensure PHI is protected and organizations are protecting themselves from breaches, reputational damage, and potential legal issues.&lt;br&gt;&lt;/p&gt;</description>
      <link>https://isc2chapter-southflorida.org/page-18081/8971079</link>
      <guid>https://isc2chapter-southflorida.org/page-18081/8971079</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Fri, 01 May 2020 11:07:53 GMT</pubDate>
      <title>April 29th 2020 Virtual Chapter Meeting Recording</title>
      <description>&lt;p&gt;In our most recent chapter meeting, I discussed AWS Security Basics. The AWS Well-Architected framework helps cloud architects and security professionals build applications that are configured according to AWS best practices. Based on five pillars — operational excellence, security, reliability, performance efficiency, and cost optimization — the Framework provides a consistent approach to build and scale applications. Please let us know what you thought about the event in &lt;a href="https://docs.google.com/forms/d/e/1FAIpQLSermhuDm71_5o3gwkM1NQD_3h_ER2ga0n4EbRw7QahuZccWmg/viewform?usp=sf_link" target="_blank"&gt;this short survey that takes less than 30 seconds&lt;/a&gt;!&lt;br&gt;&lt;/p&gt;

&lt;p&gt;This session we reviewed the basics of the AWS Security Pillar, specifically discussing how organizations can leverage native AWS services to implement these best practices to secure their application and ease the pain of cybersecurity audits.&lt;/p&gt;

&lt;p&gt;During this session, we walked through the AWS console and demonstrate a few services that can be used to reduce audit fatigue and evidence collection during assessments.&lt;/p&gt;

&lt;p&gt;Miami Chapter Members receive access to a hands-on Miami chapter AWS lab environment to practice these skills and validate your understanding. &lt;a href="https://www.isc2chapter-southflorida.com/Join-Us-2" target="_blank"&gt;Join the chapter today&lt;/a&gt;!&lt;/p&gt;

&lt;p&gt;&lt;iframe src="https://www.youtube.com/embed/O3kPJzq1upg" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="" width="560" height="315" frameborder="0"&gt;&lt;/iframe&gt;&lt;/p&gt;</description>
      <link>https://isc2chapter-southflorida.org/page-18081/8939281</link>
      <guid>https://isc2chapter-southflorida.org/page-18081/8939281</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Thu, 09 Apr 2020 20:24:22 GMT</pubDate>
      <title>April 9, 2020 News from the Board</title>
      <description>&lt;p&gt;First and foremost I want to wish everyone health, safety and patience during these critical times. As security professionals, we know that the best protection against any threat is not to have to face it in the first place, so it’s not hard for us to understand the urgency to maintain social distancing and follow the guidelines to help overcome the COVID-19 infection risk.&lt;/p&gt;

&lt;p&gt;Today I also want to share important news:&lt;/p&gt;

&lt;p&gt;The (ISC)2 Miami Chapter is now re-energized with new blood in the board! I’m happy to introduce our new board members:&lt;/p&gt;

&lt;p&gt;Frank Martinez, who has been an active member since the beginning and instrumental collaborator to help build and maintain the Chapter’s ties to Miami Dade College, and Nova Southeastern University is now the Secretary for the Chapter. Frank is a seasoned security expert, very well-known and respected in the local community. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;Alexander (AJ) Yawn answered our call to volunteer as a board member with a very specific interest in education, when the board met him, more than his credentials and experience, it was his enthusiasm and abundance of ideas that lead an easy decision to name him the new Education Chair.&lt;/p&gt;

&lt;p&gt;Learn more about Frank, AJ and the board here: &lt;a href="https://www.isc2chapter-southflorida.com/Board"&gt;https://www.isc2chapter-miami.org/Board&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We had to cancel our March event, but we’ve taken the opportunity to design a new approach to our educational events in a virtual format starting on April 29, 2020 with a very current topic “AWS Security Basics for CyberSecurity Audits” , members will earn CPE’s for participation as long as they register in advance here: &lt;a href="https://www.isc2chapter-southflorida.com/event-3802961"&gt;https://www.isc2chapter-miami.org/event-3802961&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We have also re-engaged (ISC)2 to discuss ideas to help deliver with new means and formats on the vision to inspire a safe and secure cyber world. In particular, we have an on-going conversation with the (ISC)2 Director of Education and the executives of the Profesional Development Institute, to brainstorm ideas and resources, stay tuned for news resulting from these dialogs.&lt;/p&gt;

&lt;p&gt;We will continue delivering events in virtual format, especially under the current circumstances, and as always your ideas and recommendations are welcome. Send them to us via email to &lt;a href="mailto:miami.isc2chapter@gmail.com"&gt;miami.isc2chapter@gmail.com&lt;/a&gt; &amp;nbsp;&lt;/p&gt;

&lt;p&gt;Please remain safe, together we shall overcome.&lt;/p&gt;

&lt;p&gt;Thank you!&lt;/p&gt;

&lt;p&gt;Arturo Santos&lt;/p&gt;

&lt;p&gt;President&lt;/p&gt;

&lt;p&gt;(ISC)2 Miami Chapter&amp;nbsp; &amp;nbsp;&lt;/p&gt;</description>
      <link>https://isc2chapter-southflorida.org/page-18081/8890338</link>
      <guid>https://isc2chapter-southflorida.org/page-18081/8890338</guid>
      <dc:creator>Arturo Santos</dc:creator>
    </item>
    <item>
      <pubDate>Wed, 01 Apr 2020 11:37:14 GMT</pubDate>
      <title>SOC 2 Examination Overview</title>
      <description>&lt;p data-pm-slice="0 0 []"&gt;Protecting customers' data is a concern for all organizations regardless of industry or size. Most organizations outsource key aspects of their business to third-party vendors such as Software-as-a-Service (SaaS) solutions or cloud hosting providers (i.e. Amazon Web Services). As companies continue to share the responsibility of protecting sensitive data, there is increased importance and scrutiny on the cybersecurity practices implemented at these organizations.&lt;/p&gt;

&lt;p&gt;Third-party assessments are a common way in which organizations prove their cybersecurity practices to vendors, customers, and prospects. SOC 2 examinations have become one of the de facto standards for organizations to prove how there are securely managing their customers' data to protect their interests and privacy. For most organizations conducting business with a SaaS provider, a SOC 2 examination is a minimum requirement. SOC 2 reports are common for other service organizations as well such as law firms, marketing agencies, accounting firms, healthcare organizations, and more.&lt;/p&gt;

&lt;p&gt;SOC 2 is a reporting framework developed by the American Institute of Certified Professional Accountants (AICPA) intended to meet the needs of a broad range of customers or vendors that require information and assurance about the controls at a service organization relevant to the&amp;nbsp;&lt;strong&gt;security&lt;/strong&gt;,&amp;nbsp;&lt;strong&gt;availability&lt;/strong&gt;, and&amp;nbsp;&lt;strong&gt;processing integrity&lt;/strong&gt;&amp;nbsp;of the systems the service organization uses to process users’ data and the&amp;nbsp;&lt;strong&gt;confidentiality&lt;/strong&gt;&amp;nbsp;and&amp;nbsp;&lt;strong&gt;privacy&lt;/strong&gt;&amp;nbsp;of the information processed by these systems. SaaS or other service organizations utilize these reports to assist with:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font face="PT Sans"&gt;Vendor due diligence&lt;/font&gt;&lt;font face="PT Sans"&gt;&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="PT Sans"&gt;Demonstrating security as a differentiator&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="PT Sans"&gt;Internal corporate governance and risk management processes&lt;/font&gt; &lt;font face="PT Sans"&gt;&lt;br&gt;&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="PT Sans"&gt;Proving security to a regulatory body or governing authority&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;SOC 2 examinations involve a Certified Professional Accounting (CPA) firm assessing an organization's information security and privacy control environment. The assessment includes a description of the controls, the tests performed to assess them, and the results of these tests.&lt;/p&gt;

&lt;h6&gt;&lt;font style="font-size: 16px;"&gt;Trust Services Categories&lt;/font&gt;&lt;br&gt;&lt;/h6&gt;

&lt;p&gt;One of the first decisions an organization has to make when pursuing a SOC 2 examination is which Trust Services Categories (TSC) will be in scope. These five categories outline the controls and topics the service organization will be evaluated against. In a SOC 2 examination, all organizations must include the Security TSC whereas the availability, processing integrity, confidentiality, and privacy TSCs are&amp;nbsp;&lt;em&gt;optional&lt;/em&gt;. The TSCs are described below:&lt;br&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Security.&lt;/strong&gt;&amp;nbsp;Information and systems are protected against unauthorized access, unauthorized disclosure of information, and damage to systems that could compromise the availability, integrity, confidentiality, and privacy of information or systems and affect the entity's ability to meet its objectives.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Availability.&lt;/strong&gt;&amp;nbsp;Information and systems are available for operation and use to meet the entity's objectives.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Processing integrity.&lt;/strong&gt;&amp;nbsp;System processing is complete, valid, accurate, timely, and authorized to meet the entity's objectives.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Confidentiality.&lt;/strong&gt;&amp;nbsp;Information designated as confidential is protected to meet the entity's objectives.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Privacy.&lt;/strong&gt;&amp;nbsp;Personal information is collected, used, retained, disclosed, and disposed of to meet the entity's objectives.&lt;/p&gt;

&lt;h6&gt;&lt;font style="font-size: 16px;"&gt;Types of SOC 2 Reports&lt;/font&gt;&lt;br&gt;&lt;/h6&gt;

&lt;p&gt;In a SOC 2 examination, organizations can undergo a SOC 2 &lt;u&gt;Type 1&lt;/u&gt; or SOC 2 &lt;u&gt;Type 2&lt;/u&gt; examination. A Type 1 examination is a report on the controls at a service organization at a specific point in time, whereas, a Type 2 examination is a report on the controls at a service organization over a period of time. The period of time evaluated in a SOC 2 Type 2 examination is typically between 3-12 months.&lt;/p&gt;

&lt;h6&gt;&lt;font style="font-size: 16px;"&gt;How often are these examinations performed?&lt;/font&gt;&lt;/h6&gt;

&lt;p&gt;A SOC 2 Type 1 examination is generally only performed once. The common scenario for Type 1 examinations is when organizations are undergoing the SOC 2 process for the first time and need a SOC 2 report as soon as possible. After the Type 1 is completed, the Type 2 reporting period immediately begins. For example, if an organizations' Type 1 report has a report date of December 31, 2019, the Type 2 reporting period would begin January 1. A SOC 2 Type 2 examination is an annual activity for organizations.&lt;br&gt;&lt;/p&gt;

&lt;h6&gt;&lt;font style="font-size: 16px;"&gt;Conclusion&lt;/font&gt;&lt;/h6&gt;

&lt;p&gt;Potential and existing customers want to know that organizations have taken all necessary measures to protect the sensitive data processed by the service. SOC 2 examinations, facilitated by an independent CPA firm, enable the service organization to demonstrate the safeguards in place that are relevant to the security, availability, processing integrity of the systems used to process sensitive data and the confidentiality and privacy safeguards in place to protect the data. These reports allow organizations to demonstrate security as a differentiator, accelerate the vendor due diligence process by undergoing one audit to respond to multiple customer requests and, most importantly, assess the information security risks your organization is facing.&lt;/p&gt;</description>
      <link>https://isc2chapter-southflorida.org/page-18081/8871765</link>
      <guid>https://isc2chapter-southflorida.org/page-18081/8871765</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Thu, 26 Mar 2020 13:00:00 GMT</pubDate>
      <title>5 Security Tips for your AWS Account</title>
      <description>&lt;p data-pm-slice="1 1 []"&gt;&lt;em&gt;&lt;font style="font-size: 12px;"&gt;This blog post was originally published on the ISC2 National Blog &lt;a href="https://blog.isc2.org/isc2_blog/2020/03/security-tips-aws-account.html" target="_blank"&gt;here&lt;/a&gt;.&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p data-pm-slice="1 1 []"&gt;Amazon Web Services (AWS) is the industry-leading cloud service provider by any metric you can find doing a quick google search. The &lt;a href="https://aws.amazon.com/compliance/shared-responsibility-model/"&gt;shared responsibility model&lt;/a&gt; is generally understood by individuals managing production workloads that are hosted on AWS and *most* auditors understand how this impacts a SOC 2 or other compliance assessment. AWS has developed several services and features to help manage the security of an organizations’ AWS account and resources. These services, when used effectively, can reduce evidence requirements, reduce or eliminate the risk of auditor findings, and most importantly secure your AWS account. These basic security configurations should be implemented for every organization hosted on AWS regardless of organizational maturity, industry or type. Following these below recommendations will also reduce evidence requirements and documentation for your SOC 2 audit. Auditors can leverage the reports, configuration screenshots, IAM policies, etc. to satisfy several controls. Reducing the operational disruption of your organization and the time it takes to achieve compliance. The below recommendations will result in a more secure AWS account and resources, reduction of time (and hopefully cost) of your SOC 2 examination and allows you to include some unique security controls in your SOC 2 report to differentiate yourself from your competitors.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Basics&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Secure your root account&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The root account on your AWS account has unlimited access to perform unlimited functions within your AWS account. It is not recommend to use your root account for daily functions, there are very few functions that require you to use your root account (familiarize yourself with these &lt;a href="https://docs.aws.amazon.com/general/latest/gr/aws_tasks-that-require-root.html"&gt;tasks&lt;/a&gt;). Securing and minimizing the use of this account is vital to securing your AWS account and resources. Your auditor will (should) ask you to prove that you have secured that account, here are a few recommendations to secure your root account:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;If you haven't, create an IAM user with administrative access and stop using your root account.&amp;nbsp;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;Enable MFA on the AWS Account Root User&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;Delete the root account access keys&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;Change the password and store in a password vault with limited access&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;Enable AWS CloudTrail and configure alerts to notify administrators when the root account is utilized&amp;nbsp;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;Add custom controls to your SOC 2 report to differentiate yourself from your competitors.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;Utilize AWS Trusted Advisor&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;AWS &lt;a href="https://www.coalfire.com/The-Coalfire-Blog/March-2019/AWS-Trusted-Advisor-for-Security-Compliance"&gt;Trusted Advisor&lt;/a&gt; provides real-time insight into your AWS account and resources to assist with ensuring your following AWS best practices. This insight includes many security checks that highlight critical security risks that you should be monitored regularly.&amp;nbsp;Here are a few recommendations to utilzie AWS Trusted Advisor:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;Ensure AWS Trusted Advisor is enabled&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;Configure weekly updated results emails for Trusted Advisor checks&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;Review Trusted Advisor checks for accuracy and implement changes to correct any identified issues (i.e. Trusted Advisor checks if MFA is enabled on your root account)&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;Provide Trusted Advisor security reports to your SOC 2 auditors to reduce evidence requirements by 25%&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;Add custom controls to your SOC 2 report to differentiate yourself from your competitors.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;Identity &amp;amp; Access Management (IAM) Credential Report&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The &lt;a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report.html"&gt;IAM credential report&lt;/a&gt; is a great resource to view the status of all users within your account, including the status of MFA configurations, passwords, and access key rotation. This report is a treasure trove of information for a SOC 2 auditor. The days of capturing an obscene amount of screenshots of your IAM user are long gone.&amp;nbsp;The below recommendations outline a few ways you should use this report:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;Review the IAM credential report on a regular (at least quarterly) basis and document the results of your review&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;Provide the IAM Credential Report to your SOC 2 auditors to reduce evidence requirements by at least 10%&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;Implement changes to correct any identified issues (i.e. a user not rotating their access keys in 2 years)&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;Add custom controls to your SOC 2 report to differentiate yourself from your competitors.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;Implement Force MFA&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The theme of the annual RSA conference this year was &lt;a href="https://www.rsaconference.com/about/rsac-themes"&gt;Human Element&lt;/a&gt;. Humans will always be an integral aspect of a cybersecurity program, despite the advancements we have made in technology. However, humans oftentimes make mistakes. Configuring MFA on AWS is simple for each user however, disabling MFA is also fairly simple for each user. This human aspect of removing MFA has caused significant findings in compliance assessments I have performed for some of the largest companies in the world. Implementing a “Force MFA” IAM policy will help eliminate this risk of humans being human, this IAM policy requires users to set up and maintain their own MFA devices and prevents them from accessing any AWS resources until they authenticate with MFA. Essentially, users can only enable MFA when their account is created and cannot access any other resources within AWS until MFA is enabled and utilized.&amp;nbsp;Here are some recommendations to consider when implementing a force MFA policy:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;Configure the Force MFA &lt;a href="https://aws.amazon.com/blogs/security/how-to-delegate-management-of-multi-factor-authentication-to-aws-iam-users/"&gt;policy&lt;/a&gt; according to AWS recommendations&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;Enable AWS CloudTrail and configure alerts to notify administrators when MFA is disabled for any user&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;Add custom controls to your SOC 2 report to differentiate yourself from your competitors.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;CloudTrail&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://aws.amazon.com/cloudtrail/"&gt;AWS CloudTrail&lt;/a&gt; allows you to audit, continuously monitor, and assess account activity taken through the AWS Management Console, AWS SDKs, command-line tools, and other services. This tool is valuable for audits but also for ongoing event-driven security. Enabling AWS CloudTrail is a minimum security requirement for any . environment, consider the following recommendations when configuring CloudTrail:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;Create a trail and ensure it is applied globally&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;Protect the S3 bucket where these logs are being sent with encryption at rest and S3 bucket policies&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;Integrate CloudTrail with Amazon CloudWatch&amp;nbsp;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;Configure &lt;a href="https://docs.aws.amazon.com/awscloudtrail/latest/userguide/use-cloudformation-template-to-create-cloudwatch-alarms.html"&gt;predefined CloudWatch metric filters and alarms, so that you receive email notifications when specific security-related API calls are made in your AWS account&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;Utilize AWS Lambda to automate activities as a result of AWS CloudTrail events&lt;/p&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;p&gt;Add custom controls to your SOC 2 report to differentiate yourself from your competitors.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;These recommendations describe how you can utilize native services within your AWS account to secure your resources and reduce audit fatigue during an SOC 2 examination. Leveraging these strategies are the bare minimum you should implement when operating a production environment on AWS. AWS makes it easy for administrators to implement these strategies and utilize to provide auditors with less evidence that is technically accurate and provides deeper assurances regarding the compliance of your account and resources.&lt;/p&gt;</description>
      <link>https://isc2chapter-southflorida.org/page-18081/8866524</link>
      <guid>https://isc2chapter-southflorida.org/page-18081/8866524</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Wed, 04 Mar 2020 11:56:42 GMT</pubDate>
      <title>Using GitHub Protected Branches to Make SOC 2 Audits Easier</title>
      <description>&lt;p data-key="4"&gt;&lt;span data-key="5"&gt;&lt;span data-slate-leaf="true" data-offset-key="5:0"&gt;&lt;span data-slate-content="true"&gt;&lt;font style="font-size: 12px;"&gt;&lt;em&gt;This blog post was originally published on HackerNoon &lt;a href="https://hackernoon.com/using-github-protected-branches-to-make-soc-2-audits-suck-less-xj4i32tp" target="_blank"&gt;here&lt;/a&gt;.&lt;/em&gt;&lt;/font&gt;&lt;br&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p data-key="4"&gt;&lt;span data-key="5"&gt;&lt;span data-slate-leaf="true" data-offset-key="5:0"&gt;&lt;span data-slate-content="true"&gt;“Hey, can you meet with our SOC 2 auditors’ for a couple of hours next week to talk about our SDLC process?” Oh no! This question continually causes heartburn and eventual headachesfor software engineers. Spending multiple hours in a conference room explaining to auditors how your team deploys changes, what a pull request is and explaining how infrastructure as code works is not how engineers would describe a productive afternoon.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p data-key="6"&gt;&lt;span data-key="7"&gt;&lt;span data-slate-leaf="true" data-offset-key="7:0"&gt;&lt;strong data-slate-mark="true"&gt;&lt;span data-slate-content="true"&gt;What is SOC 2 and why does this impact engineers?&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p data-key="8"&gt;&lt;a href="https://www.aicpa.org/interestareas/frc/assuranceadvisoryservices/aicpasoc2report.html" title="https://www.aicpa.org/interestareas/frc/assuranceadvisoryservices/aicpasoc2report.html"&gt;&lt;span data-key="11"&gt;&lt;span data-slate-leaf="true" data-offset-key="11:0"&gt;&lt;span data-slate-content="true"&gt;SOC 2&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; &lt;span data-key="12"&gt;&lt;span data-slate-leaf="true" data-offset-key="12:0"&gt;&lt;span data-slate-content="true"&gt;(or other regulatory frameworks) examinations are not going anywhere, they have become the cost of doing business for technology-enabled service organizations that provide SaaS or other services that interact with, store or transmit their customers’ sensitive information. These examinations assist organizations with proving to current and potential customers how they are securing their data. The software development process is an integral aspect of SOC 2 examinations. Every SOC 2 examination regardless of in-scope Trust Services Categories or organization type, requires an evaluation of the change management processes and procedures. Often this means spending countless hours retrieving evidence of changes and answering questions about your DevOps process with internal compliance personnel and external auditors. During a SOC 2 examination, auditors are concerned with a few specific attributes related to each software change:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ol data-key="13"&gt;
  &lt;li data-key="14"&gt;&lt;span data-key="15"&gt;&lt;span data-slate-leaf="true" data-offset-key="15:0"&gt;&lt;span data-slate-content="true"&gt;Is there formal documentation (comments on the PR, Jira ticket, etc.)?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;

  &lt;li data-key="16"&gt;&lt;span data-key="17"&gt;&lt;span data-slate-leaf="true" data-offset-key="17:0"&gt;&lt;span data-slate-content="true"&gt;Was the change tested?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;

  &lt;li data-key="18"&gt;&lt;span data-key="19"&gt;&lt;span data-slate-leaf="true" data-offset-key="19:0"&gt;&lt;span data-slate-content="true"&gt;Were there any reviews of the change or PR?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;

  &lt;li data-key="20"&gt;&lt;span data-key="21"&gt;&lt;span data-slate-leaf="true" data-offset-key="21:0"&gt;&lt;span data-slate-content="true"&gt;Was this change approved?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p data-key="22"&gt;&lt;span data-key="23"&gt;&lt;span data-slate-leaf="true" data-offset-key="23:0"&gt;&lt;span data-slate-content="true"&gt;These questions sound like they create significant obstructions to collaboration, and speed, which is essential in a DevOps environment. However, there is a way to maintain a healthy, secure codebase while also encouraging collaboration and adherence to compliance requirements.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p data-key="24"&gt;&lt;span data-key="25"&gt;&lt;span data-slate-leaf="true" data-offset-key="25:0"&gt;&lt;strong data-slate-mark="true"&gt;&lt;span data-slate-content="true"&gt;Protected Branches&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p data-key="26"&gt;&lt;span data-key="27"&gt;&lt;span data-slate-leaf="true" data-offset-key="27:0"&gt;&lt;span data-slate-content="true"&gt;Enabling protected branches and implementing native security policies on these branches will make these audit experiences tolerable and less painful. GitHub is one of the more common software development platforms in the industry, this article will focus on GitHub protected branch configurations however these same theories can be applied to other software development platforms.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;a href="https://help.github.com/en/github/administering-a-repository/about-protected-branches" title="https://help.github.com/en/github/administering-a-repository/about-protected-branches"&gt;&lt;span data-key="29"&gt;&lt;span data-slate-leaf="true" data-offset-key="29:0"&gt;&lt;span data-slate-content="true"&gt;GitHub defines protected branches&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; &lt;span data-key="30"&gt;&lt;span data-slate-leaf="true" data-offset-key="30:0"&gt;&lt;span data-slate-content="true"&gt;in the following manner, “Protected branches ensure that collaborators on your repository cannot make irrevocable changes to branches. Enabling protected branches also allows you to enable other optional checks and requirements, like required status checks and required reviews.” Protecting a branch eliminates the risk of a planned or unplanned catastrophic event where a branch is deleted. This is the first step in enabling guardrails to secure your branch. Some additional checks or requirements can be enabled with a protected branch to configure security policies are described below:&lt;br&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p data-key="31"&gt;&lt;span data-key="32"&gt;&lt;span data-slate-leaf="true" data-offset-key="32:0"&gt;&lt;strong data-slate-mark="true"&gt;&lt;span data-slate-content="true"&gt;Recommended optional checks and requirement configurations on protected branches&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p data-key="33"&gt;&lt;a href="https://help.github.com/en/github/administering-a-repository/about-required-status-checks" title="https://help.github.com/en/github/administering-a-repository/about-required-status-checks"&gt;&lt;span data-key="36"&gt;&lt;span data-slate-leaf="true" data-offset-key="36:0"&gt;&lt;em data-slate-mark="true"&gt;&lt;span data-slate-content="true"&gt;Require status checks to pass before merging&lt;/span&gt;&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul data-key="38"&gt;
  &lt;li data-key="39"&gt;&lt;span data-key="40"&gt;&lt;span data-slate-leaf="true" data-offset-key="40:0"&gt;&lt;span data-slate-content="true"&gt;This check requires that all continuous integration (CI) checks to pass before branches can be merged into the protected branch&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;

  &lt;li data-key="41"&gt;&lt;span data-key="42"&gt;&lt;span data-slate-leaf="true" data-offset-key="42:0"&gt;&lt;span data-slate-content="true"&gt;CI tools such as CircleCI, Jenkins or Travis integrate with GitHub and can provide a status check update on each prospective change&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;

  &lt;li data-key="43"&gt;&lt;span data-key="44"&gt;&lt;span data-slate-leaf="true" data-offset-key="44:0"&gt;&lt;span data-slate-content="true"&gt;Reduce evidence requirements for the SOC 2 audit by utilizing this configuration to display testing requirements for each change&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p data-key="45"&gt;&lt;a href="https://help.github.com/en/github/administering-a-repository/about-required-reviews-for-pull-requests" title="https://help.github.com/en/github/administering-a-repository/about-required-reviews-for-pull-requests"&gt;&lt;span data-key="48"&gt;&lt;span data-slate-leaf="true" data-offset-key="48:0"&gt;&lt;em data-slate-mark="true"&gt;&lt;span data-slate-content="true"&gt;Require pull request reviews before merging&lt;/span&gt;&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul data-key="50"&gt;
  &lt;li data-key="51"&gt;&lt;span data-key="52"&gt;&lt;span data-slate-leaf="true" data-offset-key="52:0"&gt;&lt;span data-slate-content="true"&gt;Code reviews are important for any development life cycle, this check requires at least one approved review before a pull request is merged.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;

  &lt;li data-key="53"&gt;&lt;span data-key="54"&gt;&lt;span data-slate-leaf="true" data-offset-key="54:0"&gt;&lt;span data-slate-content="true"&gt;This check also establishes separation of duties by preventing an engineer from merging their pull requests without a secondary review&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;

  &lt;li data-key="55"&gt;&lt;span data-key="56"&gt;&lt;span data-slate-leaf="true" data-offset-key="56:0"&gt;&lt;span data-slate-content="true"&gt;Reduce evidence requirements for the SOC 2 audit by utilizing this configuration to display review requirements for each change&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p data-key="57"&gt;&lt;a href="https://help.github.com/en/github/creating-cloning-and-archiving-repositories/about-code-owners" title="https://help.github.com/en/github/creating-cloning-and-archiving-repositories/about-code-owners"&gt;&lt;span data-key="60"&gt;&lt;span data-slate-leaf="true" data-offset-key="60:0"&gt;&lt;em data-slate-mark="true"&gt;&lt;span data-slate-content="true"&gt;Require review from Code Owners&lt;/span&gt;&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul data-key="62"&gt;
  &lt;li data-key="63"&gt;&lt;span data-key="64"&gt;&lt;span data-slate-leaf="true" data-offset-key="64:0"&gt;&lt;span data-slate-content="true"&gt;Require approval from a predetermined set of users (or owners) that must approve the change before a pull request is merged&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;

  &lt;li data-key="65"&gt;&lt;span data-key="66"&gt;&lt;span data-slate-leaf="true" data-offset-key="66:0"&gt;&lt;span data-slate-content="true"&gt;Reduce evidence requirements for the SOC 2 audit by utilizing this configuration to display approval requirements for each change&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p data-key="67"&gt;&lt;span data-key="68"&gt;&lt;span data-slate-leaf="true" data-offset-key="68:0"&gt;&lt;strong data-slate-mark="true"&gt;&lt;span data-slate-content="true"&gt;Conclusion&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p data-key="69" data-slate-fragment="%7B%22object%22%3A%22document%22%2C%22data%22%3A%7B%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22block%22%2C%22type%22%3A%22paragraph%22%2C%22data%22%3A%7B%22className%22%3Anull%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22%E2%80%9CHey%2C%20can%20you%20meet%20with%20our%20SOC%202%20auditors%E2%80%99%20for%20a%20couple%20of%20hours%20next%20week%20to%20talk%20about%20our%20SDLC%20process%3F%E2%80%9D%20Oh%20no!%20This%20question%20continually%20causes%20heartburn%20and%20eventual%20headachesfor%20software%20engineers.%20Spending%20multiple%20hours%20in%20a%20conference%20room%20explaining%20to%20auditors%20how%20your%20team%20deploys%20changes%2C%20what%20a%20pull%20request%20is%20and%20explaining%20how%20infrastructure%20as%20code%20works%20is%20not%20how%20engineers%20would%20describe%20a%20productive%20afternoon.%20%22%2C%22marks%22%3A%5B%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22block%22%2C%22type%22%3A%22paragraph%22%2C%22data%22%3A%7B%22className%22%3Anull%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22What%20is%20SOC%202%20and%20why%20does%20this%20impact%20engineers%3F%22%2C%22marks%22%3A%5B%7B%22object%22%3A%22mark%22%2C%22type%22%3A%22bold%22%2C%22data%22%3A%7B%7D%7D%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22block%22%2C%22type%22%3A%22paragraph%22%2C%22data%22%3A%7B%22className%22%3Anull%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22%22%2C%22marks%22%3A%5B%5D%7D%5D%7D%2C%7B%22object%22%3A%22inline%22%2C%22type%22%3A%22link%22%2C%22data%22%3A%7B%22href%22%3A%22https%3A%2F%2Fwww.aicpa.org%2Finterestareas%2Ffrc%2Fassuranceadvisoryservices%2Faicpasoc2report.html%22%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22SOC%202%22%2C%22marks%22%3A%5B%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22%20(or%20other%20regulatory%20frameworks)%20examinations%20are%20not%20going%20anywhere%2C%20they%20have%20become%20the%20cost%20of%20doing%20business%20for%20technology-enabled%20service%20organizations%20that%20provide%20SaaS%20or%20other%20services%20that%20interact%20with%2C%20store%20or%20transmit%20their%20customers%E2%80%99%20sensitive%20information.%20These%20examinations%20assist%20organizations%20with%20proving%20to%20current%20and%20potential%20customers%20how%20they%20are%20securing%20their%20data.%20The%20software%20development%20process%20is%20an%20integral%20aspect%20of%20SOC%202%20examinations.%20Every%20SOC%202%20examination%20regardless%20of%20in-scope%20Trust%20Services%20Categories%20or%20organization%20type%2C%20requires%20an%20evaluation%20of%20the%20change%20management%20processes%20and%20procedures.%20Often%20this%20means%20spending%20countless%20hours%20retrieving%20evidence%20of%20changes%2C%20answering%20questions%20about%20your%20DevOps%20process%20with%20internal%20compliance%20personnel%20and%20external%20auditors.%20During%20a%20SOC%202%20examination%2C%20auditors%20are%20concerned%20with%20a%20few%20specific%20attributes%20related%20to%20each%20software%20change%3A%22%2C%22marks%22%3A%5B%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22block%22%2C%22type%22%3A%22numbered-list%22%2C%22data%22%3A%7B%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22block%22%2C%22type%22%3A%22list-item%22%2C%22data%22%3A%7B%22className%22%3Anull%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22Is%20there%20formal%20documentation%20(comments%20on%20the%20PR%2C%20Jira%20ticket%2C%20etc.)%22%2C%22marks%22%3A%5B%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22block%22%2C%22type%22%3A%22list-item%22%2C%22data%22%3A%7B%22className%22%3Anull%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22Was%20the%20change%20tested%3F%22%2C%22marks%22%3A%5B%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22block%22%2C%22type%22%3A%22list-item%22%2C%22data%22%3A%7B%22className%22%3Anull%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22Were%20there%20any%20reviews%20of%20the%20change%20or%20PR%3F%22%2C%22marks%22%3A%5B%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22block%22%2C%22type%22%3A%22list-item%22%2C%22data%22%3A%7B%22className%22%3Anull%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22Was%20this%20change%20approved%3F%22%2C%22marks%22%3A%5B%5D%7D%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22block%22%2C%22type%22%3A%22paragraph%22%2C%22data%22%3A%7B%22className%22%3Anull%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22These%20questions%20sound%20like%20they%20create%20significant%20obstructions%20to%20collaboration%2C%20and%20speed%2C%20which%20is%20essential%20in%20a%20DevOps%20environment.%20However%2C%20there%20is%20a%20way%20to%20maintain%20a%20healthy%2C%20secure%20codebase%20while%20also%20encouraging%20collaboration%20and%20adherence%20to%20compliance%20requirements.%C2%A0%22%2C%22marks%22%3A%5B%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22block%22%2C%22type%22%3A%22paragraph%22%2C%22data%22%3A%7B%22className%22%3Anull%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22Protected%20Branches%22%2C%22marks%22%3A%5B%7B%22object%22%3A%22mark%22%2C%22type%22%3A%22bold%22%2C%22data%22%3A%7B%7D%7D%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22block%22%2C%22type%22%3A%22paragraph%22%2C%22data%22%3A%7B%22className%22%3Anull%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22Enabling%20protected%20branches%20and%20implementing%20native%20security%20policies%20on%20these%20branches%20will%20make%20these%20audit%20experiences%20tolerable%20and%20less%20painful.%20GitHub%20is%20one%20of%20the%20more%20common%20software%20development%20platforms%20in%20the%20industry%2C%20this%20article%20will%20focus%20on%20GitHub%20protected%20branch%20configurations%20however%20these%20same%20theories%20can%20be%20applied%20to%20other%20software%20development%20platforms.%20%22%2C%22marks%22%3A%5B%5D%7D%5D%7D%2C%7B%22object%22%3A%22inline%22%2C%22type%22%3A%22link%22%2C%22data%22%3A%7B%22href%22%3A%22https%3A%2F%2Fhelp.github.com%2Fen%2Fgithub%2Fadministering-a-repository%2Fabout-protected-branches%22%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22GitHub%20defines%20protected%20branches%22%2C%22marks%22%3A%5B%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22%20in%20the%20following%20manner%2C%20%E2%80%9CProtected%20branches%20ensure%20that%20collaborators%20on%20your%20repository%20cannot%20make%20irrevocable%20changes%20to%20branches.%20Enabling%20protected%20branches%20also%20allows%20you%20to%20enable%20other%20optional%20checks%20and%20requirements%2C%20like%20required%20status%20checks%20and%20required%20reviews.%E2%80%9D%20Protecting%20a%20branch%20eliminates%20the%20risk%20of%20a%20planned%20or%20unplanned%20catastrophic%20event%20where%20a%20branch%20is%20deleted.%20This%20is%20the%20first%20step%20in%20enabling%20guardrails%20to%20secure%20your%20branch.%20Some%20additional%20checks%20or%20requirements%20can%20be%20enabled%20with%20a%20protected%20branch%20to%20configure%20security%20policies%C2%A0%22%2C%22marks%22%3A%5B%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22block%22%2C%22type%22%3A%22paragraph%22%2C%22data%22%3A%7B%22className%22%3Anull%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22Recommended%20optional%20checks%20and%20requirement%20configurations%20on%20protected%20branches%22%2C%22marks%22%3A%5B%7B%22object%22%3A%22mark%22%2C%22type%22%3A%22bold%22%2C%22data%22%3A%7B%7D%7D%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22block%22%2C%22type%22%3A%22paragraph%22%2C%22data%22%3A%7B%22className%22%3Anull%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22%22%2C%22marks%22%3A%5B%7B%22object%22%3A%22mark%22%2C%22type%22%3A%22italic%22%2C%22data%22%3A%7B%7D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22inline%22%2C%22type%22%3A%22link%22%2C%22data%22%3A%7B%22href%22%3A%22https%3A%2F%2Fhelp.github.com%2Fen%2Fgithub%2Fadministering-a-repository%2Fabout-required-status-checks%22%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22Require%20status%20checks%20to%20pass%20before%20merging%22%2C%22marks%22%3A%5B%7B%22object%22%3A%22mark%22%2C%22type%22%3A%22italic%22%2C%22data%22%3A%7B%7D%7D%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22%22%2C%22marks%22%3A%5B%7B%22object%22%3A%22mark%22%2C%22type%22%3A%22italic%22%2C%22data%22%3A%7B%7D%7D%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22block%22%2C%22type%22%3A%22bulleted-list%22%2C%22data%22%3A%7B%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22block%22%2C%22type%22%3A%22list-item%22%2C%22data%22%3A%7B%22className%22%3Anull%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22This%20check%20requires%20that%20all%20continuous%20integration%20(CI)%20checks%20to%20pass%20before%20branches%20can%20be%20merged%20into%20the%20protected%20branch%22%2C%22marks%22%3A%5B%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22block%22%2C%22type%22%3A%22list-item%22%2C%22data%22%3A%7B%22className%22%3Anull%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22CI%20tools%20such%20as%20CircleCI%2C%20Jenkins%20or%20Travis%20integrate%20with%20GitHub%20and%20can%20provide%20a%20status%20check%20update%20on%20each%20prospective%20change%22%2C%22marks%22%3A%5B%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22block%22%2C%22type%22%3A%22list-item%22%2C%22data%22%3A%7B%22className%22%3Anull%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22Reduce%20evidence%20requirements%20for%20the%20SOC%202%20audit%20by%20utilizing%20this%20configuration%20to%20display%20testing%20requirements%20for%20each%20change%22%2C%22marks%22%3A%5B%5D%7D%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22block%22%2C%22type%22%3A%22paragraph%22%2C%22data%22%3A%7B%22className%22%3Anull%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22%22%2C%22marks%22%3A%5B%7B%22object%22%3A%22mark%22%2C%22type%22%3A%22italic%22%2C%22data%22%3A%7B%7D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22inline%22%2C%22type%22%3A%22link%22%2C%22data%22%3A%7B%22href%22%3A%22https%3A%2F%2Fhelp.github.com%2Fen%2Fgithub%2Fadministering-a-repository%2Fabout-required-reviews-for-pull-requests%22%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22Require%20pull%20request%20reviews%20before%20merging%22%2C%22marks%22%3A%5B%7B%22object%22%3A%22mark%22%2C%22type%22%3A%22italic%22%2C%22data%22%3A%7B%7D%7D%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22%22%2C%22marks%22%3A%5B%7B%22object%22%3A%22mark%22%2C%22type%22%3A%22italic%22%2C%22data%22%3A%7B%7D%7D%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22block%22%2C%22type%22%3A%22bulleted-list%22%2C%22data%22%3A%7B%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22block%22%2C%22type%22%3A%22list-item%22%2C%22data%22%3A%7B%22className%22%3Anull%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22Code%20reviews%20are%20important%20for%20any%20development%20lifecycle%2C%20this%20check%20requires%20at%20least%20one%20approved%20review%20before%20a%20pull%20request%20is%20merged.%C2%A0%22%2C%22marks%22%3A%5B%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22block%22%2C%22type%22%3A%22list-item%22%2C%22data%22%3A%7B%22className%22%3Anull%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22This%20check%20also%20establishes%20separation%20of%20duties%20by%20preventing%20an%20engineer%20from%20merging%20their%20pull%20requests%20without%20a%20secondary%20review%22%2C%22marks%22%3A%5B%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22block%22%2C%22type%22%3A%22list-item%22%2C%22data%22%3A%7B%22className%22%3Anull%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22Reduce%20evidence%20requirements%20for%20the%20SOC%202%20audit%20by%20utilizing%20this%20configuration%20to%20display%20review%20requirements%20for%20each%20change%22%2C%22marks%22%3A%5B%5D%7D%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22block%22%2C%22type%22%3A%22paragraph%22%2C%22data%22%3A%7B%22className%22%3Anull%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22%22%2C%22marks%22%3A%5B%7B%22object%22%3A%22mark%22%2C%22type%22%3A%22italic%22%2C%22data%22%3A%7B%7D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22inline%22%2C%22type%22%3A%22link%22%2C%22data%22%3A%7B%22href%22%3A%22https%3A%2F%2Fhelp.github.com%2Fen%2Fgithub%2Fcreating-cloning-and-archiving-repositories%2Fabout-code-owners%22%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22Require%20review%20from%20Code%20Owners%22%2C%22marks%22%3A%5B%7B%22object%22%3A%22mark%22%2C%22type%22%3A%22italic%22%2C%22data%22%3A%7B%7D%7D%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22%22%2C%22marks%22%3A%5B%7B%22object%22%3A%22mark%22%2C%22type%22%3A%22italic%22%2C%22data%22%3A%7B%7D%7D%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22block%22%2C%22type%22%3A%22bulleted-list%22%2C%22data%22%3A%7B%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22block%22%2C%22type%22%3A%22list-item%22%2C%22data%22%3A%7B%22className%22%3Anull%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22Require%20approval%20from%20a%20predetermined%20set%20of%20users%20(or%20owners)%20that%20must%20approve%20the%20change%20before%20a%20pull%20request%20is%20merged%22%2C%22marks%22%3A%5B%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22block%22%2C%22type%22%3A%22list-item%22%2C%22data%22%3A%7B%22className%22%3Anull%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22Reduce%20evidence%20requirements%20for%20the%20SOC%202%20audit%20by%20utilizing%20this%20configuration%20to%20display%20approval%20requirements%20for%20each%20change%22%2C%22marks%22%3A%5B%5D%7D%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22block%22%2C%22type%22%3A%22paragraph%22%2C%22data%22%3A%7B%22className%22%3Anull%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22Conclusion%22%2C%22marks%22%3A%5B%7B%22object%22%3A%22mark%22%2C%22type%22%3A%22bold%22%2C%22data%22%3A%7B%7D%7D%5D%7D%5D%7D%5D%7D%2C%7B%22object%22%3A%22block%22%2C%22type%22%3A%22paragraph%22%2C%22data%22%3A%7B%22className%22%3Anull%7D%2C%22nodes%22%3A%5B%7B%22object%22%3A%22text%22%2C%22leaves%22%3A%5B%7B%22object%22%3A%22leaf%22%2C%22text%22%3A%22Security%20and%20compliance%20can%20no%20longer%20be%20an%20afterthought%20for%20DevOps%20teams.%20Integrating%20security%20configurations%20into%20the%20software%20deployment%20pipeline%20will%20allow%20developers%20to%20bake%20software%20security%20in%20every%20stage%20of%20the%20process.%20Compliance%20assessments%20like%20SOC%202%20or%20PCI-DSS%20are%20inevitably%20going%20to%20impact%20your%20development%20team%20and%20process.%20Enabling%20native%20configurations%20to%20systematically%20enforce%20these%20security%20requirements%20will%20make%20these%20compliance%20assessments%20easier%20to%20obtain%2C%20maintain%2C%20and%20hopefully%20make%20those%20conversations%20with%20auditors%20a%20little%20shorter%20and%20less%20complex%20for%20all%20parties%20involved.%5Cn%5Cn%22%2C%22marks%22%3A%5B%5D%7D%5D%7D%5D%7D%5D%7D"&gt;&lt;span data-key="70"&gt;&lt;span data-slate-leaf="true" data-offset-key="70:0"&gt;&lt;span data-slate-content="true"&gt;Security and compliance can no longer be an afterthought for DevOps teams. Integrating security configurations into the software deployment pipeline will allow developers to bake software security in every stage of the process. Compliance assessments like SOC 2 or PCI-DSS are inevitably going to impact your development team and process. Enabling native configurations to systematically enforce these security requirements will make these compliance assessments easier to obtain, maintain, and hopefully make those conversations with auditors a little shorter and less complex for all parties involved.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</description>
      <link>https://isc2chapter-southflorida.org/page-18081/8866525</link>
      <guid>https://isc2chapter-southflorida.org/page-18081/8866525</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Sat, 30 Mar 2019 01:18:24 GMT</pubDate>
      <title>How to strengthen your Personal Cyber Security</title>
      <description>&lt;p&gt;&lt;font style="font-size: 14px;" face="Open Sans" color="#333333"&gt;&lt;img src="https://www.isc2chapter-southflorida.com/resources/Pictures/cyber-security.jpg" alt="" title="" width="247" height="182" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 14px;" face="Open Sans" color="#333333"&gt;There are 27 Key things you can do today that will strengthen your personal Cyber Security Defenses.&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ol&gt;
    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Always patch your operating system and all applications on all devices, workstations, laptops, tablets, Cell Phones.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Use strong passwords&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Don’t reuse passwords. Keep unique passwords for each site or application.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Use 2 Factor Authentication.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Encrypt your computers. You can use Vera crypt, Symantec PGP, Bit locker. Full Disk Encryption is what you need in case your device is compromised.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Use a BIOS Password. That prevents someone from loading a boot-able Linux distribution disk and reading all of the data off your hard drive.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Use a VPN.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Delete any old emails especially if the information is sensitive.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Physical security is important, don’t leave your computers unattended.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Be careful when opening attachments and only open emails from known or trusted senders.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Do not enable macros on any documents opened in an email. Open the document in protected view.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Don’t send sensitive information electronically unless you can verify who the sender that is requesting it is.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Use a static DNS Server entry for example you can use Googles DNS Servers - 8.8.8.8. This will help prevent browser hijacking sessions and browser redirects.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Use HTTPS whenever possible and if the site you are going to has an invalid or corrupt security certificate it’s best not to go to that site.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Use updated antivirus and anti-malware programs and run regular scans.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Don’t provide too much personal information in your online profiles in LinkedIn or Facebook or any online sites.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Limit the amount of personal information you give out, for example avoid giving out your address or phone number if not needed.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Don’t visit unfamiliar sites.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Be careful when typing in the URL, if you are not sure, then do a google search for the exact URL as some sites take advantage and prey on typo squatting techniques.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Try to use Chrome instead of Firefox or IE. It can have better security. This is a personal preference though.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Make regular online or cloud based backups of your data.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Don’t install unnecessary software on your computer.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Disable unnecessary services.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Don’t login to your computer as a local admin, login as a standard user.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Use strong passwords on your router and disable remote administration of your router, update the firmware on your router, change the default SSID of your home wireless network and set the SSID to not broadcast.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Don’t give your credentials to anyone. If a visitor, friend or relative need to use your computer setup a temporary account with a strong password NOT The same password you are using for your login of course!&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;&lt;span&gt;&lt;font&gt;Don’t write down your password anywhere.&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/li&gt;
  &lt;/ol&gt;

  &lt;div align="right"&gt;
    &lt;img src="https://www.isc2chapter-southflorida.com/resources/Pictures/Miami-Logo.png" alt="" title="" width="189" height="104" border="0"&gt;&lt;br&gt;
  &lt;/div&gt;
&lt;/div&gt;</description>
      <link>https://isc2chapter-southflorida.org/page-18081/7251944</link>
      <guid>https://isc2chapter-southflorida.org/page-18081/7251944</guid>
      <dc:creator />
    </item>
  </channel>
</rss>