• RSA Announces Availability of RSA Exchange Release R11

    Summary: RSA announces availability of RSA Exchange Release R11. Details: RSA announces availability of RSA Exchange Release R11. This release includes new and updated offerings:   App-Packs – pre-bui...
  • NTT ISMS Control Assessment App-Pack

    Designing the right processes, organization, and templates during the initial setup of an Information Security Management System (ISMS) are challenges organizations face. Rolling out ISMS in a big organization require...
    Gloria Higley
    last modified by Christine Tran
  • RSA Archer IoT Project Readiness App-Pack

      Companies see value in IoT technology and data collection to improve processes and analyze trends.  However, 35% of customers site security concerns and IoT implementations as a barrier to the organization...
    Christine Tran
    last modified by Christine Tran
  • RSA Archer Authoritative Source Data Feed Tool & Utility

    The RSA Archer Authoritative Source Data Feed offering enables RSA Archer administrators to simplify the content package import process. Due to the requirement to modify key fields, and then run an import for each fil...
    Gloria Higley
    last modified by Gloria Higley
  • RSA Exchange Offering List

      Looking for a specific RSA Exchange offering? The tables below provide a list of all available RSA Exchange offerings. Please note that videos, implementation guides and implementation packages require lo...
    Susan Read-Miller
    last modified by Christine Tran
  • AWS IAM Access Analyzer Integration

      The AWS IAM Access Analyzer integration helps cloud operations teams to identify potential security risks with cloud resources in their AWS environment. It informs which resources are shared with external prin...
    Christine Tran
    last modified by Susan Read-Miller
  • Cysiv Command Integration

    Cysiv Command is a modern security operations and analytics platform. It is the foundation for Cysiv’s threat monitoring, detection, hunting, investigation, and remediation service features. It combines a number...
    Gloria Higley
    last modified by Gloria Higley
  • Panaseer Platform Integration

    Traditionally, Governance, Risk and Compliance (GRC) functions have relied on manual, human-driven approaches to self-assess and assure that controls are deployed and implemented correctly. To assure a compl...
    Gloria Higley
    last modified by Susan Read-Miller
  • Rapid7 Nexpose Vulnerability Management Integration

      Rapid7 Nexpose provides live vulnerability management and endpoint analytics to view real-time risk. Clients can continuously identify and assess risk across cloud, virtual, remote, local, and containerized in...
    Susan Read-Miller
    last modified by Christine Tran
  • ThreatWatch Integration

    ThreatWatch is a pro-active cyber security solution that uses an AI powered vulnerability curation and no scan approach for impact assessment of assets including source code, containers, cloud instances, and servers. ...
    Gloria Higley
    last modified by Gloria Higley
  • Baseline Security Recommendations for IoT Authoritative Source Content

    The Baseline Security Recommendations for Internet of Things (IoT) is a set of recommendations from the European Union Agency for CyberSecurity.  It is a reference point and foundation to set the scene for IoT se...
    Gloria Higley
    last modified by Gloria Higley
  • Brazil LGPD General Law for the Protection of Personal Data Authoritative Source Content

    Law 13.709/18 of Brazil is the General Law for the Protection of Personal Data, also known as “Lei Geral de Proteção de Dados - LGPD” and is intended to regulate the treatment of personal data ...
    Christine Tran
    last modified by Gloria Higley
  • California Consumer Privacy Act Authoritative Source Content

    The California Consumer Privacy Act was passed in June, 2018 and goes into effect on January 1, 2020.  This bill grants consumers the right to request businesses disclose the categories and specific pieces of per...
    Susan Read-Miller
    last modified by Christine Tran
  • Centers for Medicare and Medicaid Services Authoritative Source Content

    The Centers for Medicare & Medicaid Services, CMS, is part of the Department of Health and Human Services (HHS). Four sources are available for the Centers of Medicare and Medicaid Services:    ...
    Susan Read-Miller
    last modified by Christine Tran
  • Cyber Essentials PLUS Authoritative Source Content

    Cyber Essentials is published by the UK National Cyber Security Centre as a simple but effective, government-backed scheme that will help to protect an organization, whatever its size, against a range of the most comm...
    Gloria Higley
    last modified by Gloria Higley
  • Federal Financial Institutions Examination Council (FFIEC) Booklets Authoritative Source Content

    The Federal Financial Institutions Examination Council (FFIEC) is a formal inter-agency body empowered to prescribe uniform principles, standards, and report forms for the federal examination of financial institu...
    Susan Read-Miller
    last modified by Gloria Higley
  • North American Electric Reliability Corporation (NERC) Standards Authoritative Source Content

    The North American Electric Reliability Corporation is a nonprofit corporation which was formed by the electric utility industry to promote the reliability and adequacy of bulk power transmission in the electric utili...
    Susan Read-Miller
    last modified by Christine Tran
  • National Institute of Standards and Technology Guidelines Authoritative Source Content

    The National Institute of Standards and Technology (NIST) is a part of the U.S. Department of Commerce. NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, sta...
    Susan Read-Miller
    last modified by Gloria Higley
  • RSA Archer Advanced Workflow Content Assistant Tool & Utility

      As the organization’s business processes change and improve to meet business demands, it is sometimes necessary to change the advanced workflow business flow for an application.  When an advanced wo...
    Susan Read-Miller
    last modified by Susan Read-Miller
  • Shared Assessments Standard Information Gathering Template (SIG) Question Library Content

    The Shared Assessments Program has been setting the standard in third party risk management since 2005, when the Big Four and six global banks collaborated to form Shared Assessments to address the inefficiencies surr...
    Corey Carpenter
    last modified by Susan Read-Miller