Identity Underground
132 FOLLOWERS
My connector space to the internet metaverse (also my external memory, so I can easily share what I learn), where I share my opinions on identity access & management, enterprise security and more! With +20y experience, I built strong experience in enterprise security & architecture, identity & access management and many other security related fields.
Identity Underground
2h ago
Access to course materials
PECB Kate
Kate app
Kate Web
Access via PECB profile
Planning exam
PECB Profile > Exams
PECB Exams direct link online
PECB Exam application
Helpful links
Exam handbooks
PECB Exam Preparation
PECB Exam Rules and policies
PECB Online Examinee manual (PDF)
PECB Exam platform user guide
Exam Handbooks
NIS 2
CISO
ISO27001
Extra material
For each exam:
ISO Standards
NIS 2
Exam Handbook
NIS2 legislation
DORA
Legislation
GDPR
Legislation
Some practical hints and tips for the exam
To prepare for the exam
Open book
Closed book
Prepare the content ..read more
Identity Underground
1M ago
Crosspost
Scope
Feedback
Important note
Certified vs Accredited
Certification in GDPR
Comparison Chart
Company approach and purpose
Course & exam comparison
Extra online material
Experience requirements
Exam and maintenance fees
Planning your certification roadmap
References
Download
White label version
Thank you
Crosspost
Originally posted on LinkedIN: https://www.linkedin.com/feed/update/urn:li:linkedInArticle:6641236404540108800/
Download: http://blog.cyberminute.com/wp-content/uploads/2024/03/data-protection-certification-track-comparison-IAPP-PECB-final.pdf
Full page online art ..read more
Identity Underground
1M ago
Introduction
Part 1
Presentation collaterals
Introduction (p1 & 2)
Security = PPT (slide 3-4)
Security across the company (slide 5)
Management team responsibility (p6)
Security controls and measures (p7)
Security is a process, continuously changing (p8)
How are you doing? (p9)
How is your customer or supplier doing? (p10)
Monitoring or Audit: what’s the difference ? (p11)
Audit types (p12-15)
Audit types : internal audit
Audit types : 2nd party audit (mutual)
Audit types : 3rd party audit (external)
Audit main principles (p16)
Audit red flags
1. First login with god mode (p17)
Hac ..read more
Identity Underground
1M ago
Source:
Event website
Main page
My session page
Presentation published on Youtube
Download my slide deck from SlideShare
Powerpoint presentation
Slide content
Other event videos
Source: Event website Main page
https://aicmwc.azurewebsites.net
My session page
https://aicmwc.azurewebsites.net/Peter-GEELEN
Presentation published on Youtube
Download my slide deck from SlideShare Powerpoint presentation
Direct link: https://www.slideshare.net/slideshows/red-flags-and-attention-points-in-cloud-security-audit-watch-the-security-gates/266338983
Slide content Other event videos
https://www.you ..read more
Identity Underground
1M ago
Credits
In short
Audience
Typical audit issues to solve with this approach
Audit Audience
CISO/ISMS Consultant
Auditor (internal/external)
Purpose of this template
Preparation to use the slide deck
What’s in the presentation template?
0. Before we start
0.1 Hidden slides
0.2 Slide layout (now anonymous blank)
1. Front page
2. Manual (hidden)
3. Your team in short
4. Team in organigram (visual)
5. Team responsibility & tasks
6&7. Process Turtle (2 versions, hidden)
8. Reference documentation
9. Current tasks & projects
10. Recent changes
11. Important success stories (good n ..read more
Identity Underground
2M ago
Outlook settings roaming
Issue: Signature roaming not included in Outlook settings roaming
How to setup Outlook signature roaming
Find the signature folder on system drive (user profile)
Copy the signature file folder content to OneDrive
Rename old local signature folder
Create Signature folder junction to OneDrive folder
What is a junction?
Redo – In case of PC reset or another pc or outlook client
Important warning for outlook data files
References
Outlook settings roaming
In the new Microsoft Outlook, you can set Cloud storage options to enable roaming for Outlook settings (use the sam ..read more
Identity Underground
3M ago
Sometimes it comes handy to block the screensaver or automatic screenlock to keep your screen active for example during a demo or an audit to take notes.
While a typical Powerpoint presentation will keep your desktop active, this is not usable during a demo or audit for example.
When you want to leave your Windows 11 desktop open and available, there is a quick handy tip you can use.
Windows Mobility Center to the rescue.
Windows Mobility Center
Hit the windows button or search the menu for Windows Mobility center.
Check the Presentation Settings , hit the “Turn on” button.
To stop, hit the b ..read more
Identity Underground
3M ago
Background
Issue
Error message
Where you actually should go
Background
Due to issues with Windows 11, I had to reinstall/reset the system, including Office, nowadays Microsoft 365.
Issue
As I’m an Dutch speaking Belgian, I’m working with Dutch language documents…
No, that’s not the issue.
The actual issue: Word started to throw errors on the proofing tools for the Dutch language.
Error message
“MISSING PROOFING TOOLS: Text in Dutch is not being checked. Do you want to download proofing tools and future updates?”
Then it displays a “Download” button, like shown below
When you hit the downloa ..read more
Identity Underground
3M ago
Background
Quick hint
Default apps missing
Other apps?
Other Windows client DRP hints
Background
A few weeks ago my Windows 11 laptop lost control over it’s keyboard due to a security update.
Pretty sure my keyboard is physically OK, I had to reset my pc, found some time last weekend.
After reset my Windows 11 acted normal, even with recent security updates loaded.
[Personal note: still need to troubleshoot which Windows update exactly crashed my keyboard drivers beyond reparation. #FUBAR Possible corruption caused by conflict with apps installed. More on this later.]
Luckily I had a data ..read more
Identity Underground
3M ago
This article tries to gather reference material about the implementation of the European #NIS2 directive in the various countries.
The content is updated as information comes in.
Europe
NIS & NIS2 overview
National strategy map
Digital Strategy
CyberSecurity policy
Countries (alphabetical)
Austria (AT)
Belgium (BE)
Bulgaria (BG)
Germany (DE)
France (FR)
Ireland (IE)
Netherlands (NL)
Sources
Bird & Bird – NIS2 Tracker
EurActive
NCTV.nl
Europe NIS & NIS2 overview
State of play on NIS implementation: https://digital-strategy.ec.europa.eu/en/policies/nis-transposition
Nati ..read more