Free (ISC)² Exams flash cards all in one place (*)

(*) with respect for your privacy, no login, nor mail required for CISSP Domain 1: Security and Risk-Management Domain 2: Asset SecurityDomain 3: Security Architecture and EngineeringDomain 4: Communication and Network SecurityDomain 5: Identity and Access ManagementDomain 6: Security Assessment and TestingDomain 7: Security OperationsDomain 8: Software Development Security CSSLP Domain 1: Secure Software ConceptsDomain 2: Secure...

Note-to-self: Reference Articles on eID, privacy & GDPR

Following list of articles is a memory help and quick reference to interesting and useful articles from regarding the use of eID (Belgian Identity Card), related to privacy, data protection and GDPR. This article will be updated regularlywhen interesting items are discussed or noted on workshops, discussions or other social media like LinkedIn. eID GBA Advisory on photocopy identity...

Visio – PDCA cycle graphics (EN, FR, NL)

This visio has a editable version of the PDCA cycle hosted on Wiki pedia as image. Source: https://en.wikipedia.org/wiki/PDCA Text is available under the Creative Commons Attribution-ShareAlike License;   this license applies to this work too. Quoted from source: “PDCA (plan–do–check–act or plan–do–check–adjust) is an iterative four-step management method used in business for the control and continuous...

Useful GDPR resources (Working doc)

Certification IAPP article: 4 GDPR-certification myths dispelled (EN) NL: 4 GDPR certificatie mythes ontkracht FR:  Les 4 vérités sur la certification RGPD EDPB (European Data protection Board) GDPR docs: https://edpb.europa.eu/node/28 Guidelines 1/2018 on certification and identifying certification criteria in accordance with Articles 42 and 43 of the Regulation – version adopted after public consultation ENISA Interplay...

Note-to-self: logging policy considerations

Few days ago I got a question from a security officer for guidance on event and system logging. What I can recommend: a good guideline and indication is this from OWASP. You know OWASP is THE reference for software security …. with their OWASP top 10 etc. Check this: https://owasp.org/www-project-cheat-sheets/cheatsheets/Logging_Cheat_Sheet Another reference from NIST see below, very handy. These are fairly complete in terms of...

Note-to-self: 2019 …cost of a data breach…

Many InfoSec and data protection or privacy courses reference 3 authoritative yearly reports that show interesting numbers, statistics and trends about breaches year over year. And these are extremely useful to talk about to your management… Interesting to know they all have been updated for 2019. 1. Verizon DBIR (The Verizon Data breach Investigations Report,...

Microsoft MVP for another year: Thank you!

Just a few hours ago, I got the confirmation that I was awarded the 2019-2020 Microsoft Most Valuable Professional (MVP) award. It’s a yearly award granted by Microsoft to community leaders and influencers who passionately share their knowledge and drive the MS community. For some it’s the ultimate goal to get in the MVP program, but as the reward is granted year after year again, based on your impact of last year, it’s never...

Published on TNWIKI: .Net Framework 3.5 Troubleshooting: installation errors (Permission issue)

Published at: .Net Framework 3.5 Troubleshooting: installation errors (Permission issue) Applies to Window Server 2016 Issue .Net Framework 3.5 installation fails on Windows Server 2016 Troubleshooting Tried many solutions like below .NET 3.5 Uninstall detected See: MIM 2016 Troubleshooting: The installation just hanging without error, warning, log, Event-log Windows Feature installation See: Windows Server 2012 R2...