A Parachute for the Restoration of Trust After Your Firm Has Been Breached, by Charles Cresson Wood. This article details some of the actions directors and officers should take after a data breach at their organization
Breaking Down Silos: The Power of Collaborative Information Security and Internal Audit in the Three Lines of Defense, by Ignatius Ravi. This article looks at the history and importance of effective three lines of defense
Python Programming, by Constantinos Doskas – ISSA-NOVA Member – Master in Information Assurance. This article is part of a series of articles which deal with topics in programming using the Python programming language. In previous articles we presented Python programs which use the Fourier Transform, linear regression, multi-linear regression, supervised learning algorithm, logistic regression and decision tree algorithms. In this article we will work with the Random Forest Algorithm.
Inoltre in questa edizione:
From the President: Hello Fellow ISSA Members! Candy Alexander, International President
Open Forum Dangers of the Metaverse Part III: Psychological Factors of the Metaverse, by Robert Slade
Crypto Corner Prohibition of Encryption, by Luther Martin – ISSA Member, Silicon Valley Chapter
Open Forum Reinforcing Zero Trust Architectures for the Modern Era, by Daniel H. Gallancy, Co-founder & CEO, Atakama
Women in Security SIG Know Before You Chat with ChatGPT, by Dr. Curtis Campbell, ISSA International Board, ISSA Fellow
Cloud Security Corner The Security Implications of AI Chatbots: A Closer Look at ChatGPT, by Sean Heide, CSA Technical Director, Research