<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Zero Trust Architecture: ISO vs. MITRE ATTACK in Governance, Risk, Compliance</title>
    <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Zero-Trust-Architecture-ISO-vs-MITRE-ATTACK/m-p/73533#M1206</link>
    <description>&lt;P&gt;Hi Caute,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the great resource. I have a question: what are your thoughts on adding AI-based network detection and response to NIST 800-53 and the MITRE framework? Is it feasible for SMBs to do that, though? Thank you in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 02 Sep 2024 19:07:37 GMT</pubDate>
    <dc:creator>CST71</dc:creator>
    <dc:date>2024-09-02T19:07:37Z</dc:date>
    <item>
      <title>Zero Trust Architecture: ISO vs. MITRE ATTACK</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Zero-Trust-Architecture-ISO-vs-MITRE-ATTACK/m-p/73282#M1202</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A great resource:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://jasonlayton.com/cybersecurity/8-2024/zero-trust-architecture-iso-vs-mitre-attack" target="_blank"&gt;https://jasonlayton.com/cybersecurity/8-2024/zero-trust-architecture-iso-vs-mitre-attack&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 02:48:34 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Zero-Trust-Architecture-ISO-vs-MITRE-ATTACK/m-p/73282#M1202</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-08-21T02:48:34Z</dc:date>
    </item>
    <item>
      <title>Re: Zero Trust Architecture: ISO vs. MITRE ATTACK</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Zero-Trust-Architecture-ISO-vs-MITRE-ATTACK/m-p/73533#M1206</link>
      <description>&lt;P&gt;Hi Caute,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the great resource. I have a question: what are your thoughts on adding AI-based network detection and response to NIST 800-53 and the MITRE framework? Is it feasible for SMBs to do that, though? Thank you in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Sep 2024 19:07:37 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Zero-Trust-Architecture-ISO-vs-MITRE-ATTACK/m-p/73533#M1206</guid>
      <dc:creator>CST71</dc:creator>
      <dc:date>2024-09-02T19:07:37Z</dc:date>
    </item>
    <item>
      <title>Re: Zero Trust Architecture: ISO vs. MITRE ATTACK</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Zero-Trust-Architecture-ISO-vs-MITRE-ATTACK/m-p/73882#M1208</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/530537555"&gt;@CST71&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; First of all apologies for my tardy response - I was changing organisations and going through the disruption process of handing back equipment and being terminated as one should be when you leave one organisation and go to another.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My thoughts, a good idea - depending on what perspective you are coming from - from a Cloud Provider perspective, they are likely to add it as a service or a feature.&amp;nbsp;&amp;nbsp; Azure Well Architected Framework - provides a self assessment tool, as long as you enable the paid subscription version of Defender for Cloud.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Given the availability of various AI models, it would not surprise me that will feed NIST SP800-53 and compare with the MITRE framework and experiment with it.&amp;nbsp;&amp;nbsp; Early models would have to be thoroughly tested to ensure they work corrected or adjusted accordingly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2024 02:48:27 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Zero-Trust-Architecture-ISO-vs-MITRE-ATTACK/m-p/73882#M1208</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-09-17T02:48:27Z</dc:date>
    </item>
    <item>
      <title>Re: Zero Trust Architecture: ISO vs. MITRE ATTACK</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Zero-Trust-Architecture-ISO-vs-MITRE-ATTACK/m-p/73933#M1209</link>
      <description>&lt;P&gt;Hi Caute,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you so much for your response. I hope you are enjoying your new role!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I find helpful is your perspective on cloud providers adding AI-based network detection and response as a service or feature.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2024 12:37:34 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Zero-Trust-Architecture-ISO-vs-MITRE-ATTACK/m-p/73933#M1209</guid>
      <dc:creator>CST71</dc:creator>
      <dc:date>2024-09-18T12:37:34Z</dc:date>
    </item>
  </channel>
</rss>

