SlideShare une entreprise Scribd logo
1  sur  18
FISMArtsImproving Retention of FISMA Guidance Details with Mnemosyne A solution for effective memorization and recall of federal Information Assurance guidance
About Me Founder of FISMApedia.org and FISMArts Employed by Tantus Technologies FISMA Instructor with Potomac Forum Blogger with www.Guerilla-CISO.com Twitter: @danphilpott 2
Agenda The Need The Solution The Process Demonstration Resources 3
The Need Federal Information Assurance staff must be familiar with and cognizant of a large amount of detailedinformation. Not all staff practicing federal Information Assurance are trained for the task. Specific details are critical to success. 4
The Need – By the Numbers Example: NIST SP 800-53 Revision 3 198 Security Controls 415 Security Control Enhancements 144 Terms For each Security Control and Security Control Enhancement there is text describing the control plus supplemental guidance.   Without understanding all of a control and enhancements misinterpretations are common. 5
The Need – By the Library The Core Documents: NIST FIPS Publication 199 NIST FIPS Publication 200 NIST Special Publication 800-18 NIST Special Publication 800-30 NIST Special Publication 800-37 NIST Special Publication 800-39 NIST Special Publication 800-53 NIST Special Publication 800-53A NIST Special Publication 800-59 NIST Special Publication 800-60 (two volumes) 6 1 Adapted from Martin Nystrand/John Swales characteristics of a discourse community.
The Need – By the Library NIST Special Publication library: ~116 OMB Memoranda: ~20 Plus hundreds of additional NIST Interagency Reports, Security Bulletins and FIPS Publications This is a large Body of Knowledge 7
The Need – By the Gaps Classes present excellent overviews Independent Study can fill in details not covered in the overviews On-the-Job Training will provide detailed knowledge in a piecemeal fashion How does an information assurance professional systematically memorize pertinent guidance? 8
The Solution - Mnemosyne Flashcards?  Really? 9
The Solution - Mnemosyne More than flashcards Memorization based on the spacing effect Research based spaced repetition algorithm Handles text, images and sound Open source software Cross-platform (Windows, Mac and Linux) Learn at your own pace 10
The Solution – FISMArts Focused on providing FISMA and federal Information Assurance training material Uses authoritative source documents from NIST and OMB to create Mnemosyne content Development is simple and flexible Simply asks questions that can be answered by information in authoritative documents User rates their response If they do poorly they are asked more frequently If they do well they are asked less frequently 11
The Solution – FISMArts Content is sourced strictly from: Published Federal documents (public domain) Data sources with Creative Commons compatible licenses User generated contributions Content is licensed under the Creative Common Attribution-Share Alike 3.0 United States License 12
The Process – One Use Case Moving from source document to Mnemosyne Review document to identify important details Find line which describes the detail Formulate question answered by line Write question and line to a single line in a text file, separated by a tab character Import file into Mnemosyne Save file and distribute 13
The Process – Anything Is Possible Want to provide a tool to train staff to spot physical security problems? Take a picture of an example and ask staff to rate their response Want to help staff learn organizational policy? The authoritative document is your policy Development is simple so testing different solutions is easy. 14
Demonstration 15
Resources FISMArts –  http://fismapedia.org/index.php?title=FISMArts FISMApedia – http://fismapedia.org Mnemosyne Project–  http://www.mnemosyne-proj.org/ 16
Questions? 17
Contact Information Daniel Philpott Email: danphilpott@gmail.com Twitter: @danphilpott Telephone: (301) 825-5722 http://fismapedia.org 18

Contenu connexe

En vedette

Luxury Real Estate Stats 4 26
Luxury Real Estate Stats 4 26Luxury Real Estate Stats 4 26
Luxury Real Estate Stats 4 26njhousehelper
 
Sales Presentation
Sales PresentationSales Presentation
Sales Presentationsjpfeufer
 
Introduce Moodle
Introduce MoodleIntroduce Moodle
Introduce MoodleBrian
 
NETTAB 2012 flyer
NETTAB 2012 flyerNETTAB 2012 flyer
NETTAB 2012 flyerDan Bolser
 
Wikipedia and the Global Brain
Wikipedia and the Global BrainWikipedia and the Global Brain
Wikipedia and the Global BrainDan Bolser
 
218畢旅byShirley
218畢旅byShirley218畢旅byShirley
218畢旅byShirleyhigh18
 
Press Release Vietnam 2009 English
Press Release Vietnam 2009 EnglishPress Release Vietnam 2009 English
Press Release Vietnam 2009 EnglishLe Thuy Hanh
 
Media Kit Live Deal 3 5 09
Media Kit Live Deal 3 5 09Media Kit Live Deal 3 5 09
Media Kit Live Deal 3 5 09randiw37
 
Chien luoc-xay-dung-thuong-hieu-qua-mang-xa-hoi tại VCCI
Chien luoc-xay-dung-thuong-hieu-qua-mang-xa-hoi tại VCCIChien luoc-xay-dung-thuong-hieu-qua-mang-xa-hoi tại VCCI
Chien luoc-xay-dung-thuong-hieu-qua-mang-xa-hoi tại VCCILe Thuy Hanh
 
Lotus Mashups step by step installation guide
Lotus Mashups step by step installation guideLotus Mashups step by step installation guide
Lotus Mashups step by step installation guideChris Sparshott
 
Cellnetrix brochure 2013
Cellnetrix brochure 2013Cellnetrix brochure 2013
Cellnetrix brochure 2013Vladimir Nagin
 
BioWikis BSB10
BioWikis BSB10BioWikis BSB10
BioWikis BSB10Dan Bolser
 

En vedette (20)

Cloud Computing and ROI
Cloud Computing and ROICloud Computing and ROI
Cloud Computing and ROI
 
Luxury Real Estate Stats 4 26
Luxury Real Estate Stats 4 26Luxury Real Estate Stats 4 26
Luxury Real Estate Stats 4 26
 
IBM MQ v8 enhancements
IBM MQ v8 enhancementsIBM MQ v8 enhancements
IBM MQ v8 enhancements
 
Annette Kurman | Assisted Living Presentation
Annette Kurman  | Assisted Living PresentationAnnette Kurman  | Assisted Living Presentation
Annette Kurman | Assisted Living Presentation
 
Sales Presentation
Sales PresentationSales Presentation
Sales Presentation
 
Test
TestTest
Test
 
Introduce Moodle
Introduce MoodleIntroduce Moodle
Introduce Moodle
 
NETTAB 2012 flyer
NETTAB 2012 flyerNETTAB 2012 flyer
NETTAB 2012 flyer
 
A tong quan
A   tong quanA   tong quan
A tong quan
 
Wikipedia and the Global Brain
Wikipedia and the Global BrainWikipedia and the Global Brain
Wikipedia and the Global Brain
 
Product Platform
Product PlatformProduct Platform
Product Platform
 
Alloy - SAP Integration
Alloy - SAP IntegrationAlloy - SAP Integration
Alloy - SAP Integration
 
Folder Arena De NegóCios
Folder Arena De NegóCiosFolder Arena De NegóCios
Folder Arena De NegóCios
 
218畢旅byShirley
218畢旅byShirley218畢旅byShirley
218畢旅byShirley
 
Press Release Vietnam 2009 English
Press Release Vietnam 2009 EnglishPress Release Vietnam 2009 English
Press Release Vietnam 2009 English
 
Media Kit Live Deal 3 5 09
Media Kit Live Deal 3 5 09Media Kit Live Deal 3 5 09
Media Kit Live Deal 3 5 09
 
Chien luoc-xay-dung-thuong-hieu-qua-mang-xa-hoi tại VCCI
Chien luoc-xay-dung-thuong-hieu-qua-mang-xa-hoi tại VCCIChien luoc-xay-dung-thuong-hieu-qua-mang-xa-hoi tại VCCI
Chien luoc-xay-dung-thuong-hieu-qua-mang-xa-hoi tại VCCI
 
Lotus Mashups step by step installation guide
Lotus Mashups step by step installation guideLotus Mashups step by step installation guide
Lotus Mashups step by step installation guide
 
Cellnetrix brochure 2013
Cellnetrix brochure 2013Cellnetrix brochure 2013
Cellnetrix brochure 2013
 
BioWikis BSB10
BioWikis BSB10BioWikis BSB10
BioWikis BSB10
 

Similaire à FISMArts - Improving Retention of FISMA Guidance Details with Mnemosyne

CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxmccormicknadine86
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxsleeperharwell
 
Securing Citizen Facing Applications
Securing Citizen Facing ApplicationsSecuring Citizen Facing Applications
Securing Citizen Facing Applicationsedwinlorenzana
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Donald E. Hester
 
Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Perpetual Information Security - Driving Data Protection in an Evolving Compl...Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Perpetual Information Security - Driving Data Protection in an Evolving Compl...SafeNet
 
19Question 1 4 4 pointsLO5 What is a packetQu.docx
19Question 1 4  4 pointsLO5 What is a packetQu.docx19Question 1 4  4 pointsLO5 What is a packetQu.docx
19Question 1 4 4 pointsLO5 What is a packetQu.docxaulasnilda
 
University of maryland infa 620 homework help
University of maryland infa 620 homework helpUniversity of maryland infa 620 homework help
University of maryland infa 620 homework helpOlivia Fournier
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryptionBen Rothke
 
Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information securityMajor Hayden
 
Building A Modern Security Policy For Social Media and Government
Building A  Modern  Security  Policy For  Social  Media and GovernmentBuilding A  Modern  Security  Policy For  Social  Media and Government
Building A Modern Security Policy For Social Media and GovernmentMichael Smith
 
Ask me anything: A Conversational Interface to Augment Information Security w...
Ask me anything:A Conversational Interface to Augment Information Security w...Ask me anything:A Conversational Interface to Augment Information Security w...
Ask me anything: A Conversational Interface to Augment Information Security w...Matthew Park
 
Meeting the True Intent of File Integrity Monitoring
Meeting the True Intent of File Integrity MonitoringMeeting the True Intent of File Integrity Monitoring
Meeting the True Intent of File Integrity MonitoringTripwire
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
Common Sense Security Framework
Common Sense Security FrameworkCommon Sense Security Framework
Common Sense Security FrameworkJerod Brennen
 
Answer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docxAnswer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docxjustine1simpson78276
 
Joe Mc Adams Power Point Resume V3
Joe Mc Adams Power Point Resume V3Joe Mc Adams Power Point Resume V3
Joe Mc Adams Power Point Resume V3jmcadams14
 
4 questions to help you secure ePHI today
4 questions to help you secure ePHI today4 questions to help you secure ePHI today
4 questions to help you secure ePHI todaySarabeth Marcello
 
Week 3. Discussion .docx
Week 3.   Discussion                                            .docxWeek 3.   Discussion                                            .docx
Week 3. Discussion .docxmelbruce90096
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxinfosec train
 
Worldwide Intranet Challenge Intra Team Presentation V4
Worldwide Intranet Challenge   Intra Team Presentation V4Worldwide Intranet Challenge   Intra Team Presentation V4
Worldwide Intranet Challenge Intra Team Presentation V4Deloitte Australia
 

Similaire à FISMArts - Improving Retention of FISMA Guidance Details with Mnemosyne (20)

CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
Securing Citizen Facing Applications
Securing Citizen Facing ApplicationsSecuring Citizen Facing Applications
Securing Citizen Facing Applications
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009
 
Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Perpetual Information Security - Driving Data Protection in an Evolving Compl...Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Perpetual Information Security - Driving Data Protection in an Evolving Compl...
 
19Question 1 4 4 pointsLO5 What is a packetQu.docx
19Question 1 4  4 pointsLO5 What is a packetQu.docx19Question 1 4  4 pointsLO5 What is a packetQu.docx
19Question 1 4 4 pointsLO5 What is a packetQu.docx
 
University of maryland infa 620 homework help
University of maryland infa 620 homework helpUniversity of maryland infa 620 homework help
University of maryland infa 620 homework help
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
 
Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information security
 
Building A Modern Security Policy For Social Media and Government
Building A  Modern  Security  Policy For  Social  Media and GovernmentBuilding A  Modern  Security  Policy For  Social  Media and Government
Building A Modern Security Policy For Social Media and Government
 
Ask me anything: A Conversational Interface to Augment Information Security w...
Ask me anything:A Conversational Interface to Augment Information Security w...Ask me anything:A Conversational Interface to Augment Information Security w...
Ask me anything: A Conversational Interface to Augment Information Security w...
 
Meeting the True Intent of File Integrity Monitoring
Meeting the True Intent of File Integrity MonitoringMeeting the True Intent of File Integrity Monitoring
Meeting the True Intent of File Integrity Monitoring
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Common Sense Security Framework
Common Sense Security FrameworkCommon Sense Security Framework
Common Sense Security Framework
 
Answer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docxAnswer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docx
 
Joe Mc Adams Power Point Resume V3
Joe Mc Adams Power Point Resume V3Joe Mc Adams Power Point Resume V3
Joe Mc Adams Power Point Resume V3
 
4 questions to help you secure ePHI today
4 questions to help you secure ePHI today4 questions to help you secure ePHI today
4 questions to help you secure ePHI today
 
Week 3. Discussion .docx
Week 3.   Discussion                                            .docxWeek 3.   Discussion                                            .docx
Week 3. Discussion .docx
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
Worldwide Intranet Challenge Intra Team Presentation V4
Worldwide Intranet Challenge   Intra Team Presentation V4Worldwide Intranet Challenge   Intra Team Presentation V4
Worldwide Intranet Challenge Intra Team Presentation V4
 

Dernier

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Dernier (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

FISMArts - Improving Retention of FISMA Guidance Details with Mnemosyne

  • 1. FISMArtsImproving Retention of FISMA Guidance Details with Mnemosyne A solution for effective memorization and recall of federal Information Assurance guidance
  • 2. About Me Founder of FISMApedia.org and FISMArts Employed by Tantus Technologies FISMA Instructor with Potomac Forum Blogger with www.Guerilla-CISO.com Twitter: @danphilpott 2
  • 3. Agenda The Need The Solution The Process Demonstration Resources 3
  • 4. The Need Federal Information Assurance staff must be familiar with and cognizant of a large amount of detailedinformation. Not all staff practicing federal Information Assurance are trained for the task. Specific details are critical to success. 4
  • 5. The Need – By the Numbers Example: NIST SP 800-53 Revision 3 198 Security Controls 415 Security Control Enhancements 144 Terms For each Security Control and Security Control Enhancement there is text describing the control plus supplemental guidance. Without understanding all of a control and enhancements misinterpretations are common. 5
  • 6. The Need – By the Library The Core Documents: NIST FIPS Publication 199 NIST FIPS Publication 200 NIST Special Publication 800-18 NIST Special Publication 800-30 NIST Special Publication 800-37 NIST Special Publication 800-39 NIST Special Publication 800-53 NIST Special Publication 800-53A NIST Special Publication 800-59 NIST Special Publication 800-60 (two volumes) 6 1 Adapted from Martin Nystrand/John Swales characteristics of a discourse community.
  • 7. The Need – By the Library NIST Special Publication library: ~116 OMB Memoranda: ~20 Plus hundreds of additional NIST Interagency Reports, Security Bulletins and FIPS Publications This is a large Body of Knowledge 7
  • 8. The Need – By the Gaps Classes present excellent overviews Independent Study can fill in details not covered in the overviews On-the-Job Training will provide detailed knowledge in a piecemeal fashion How does an information assurance professional systematically memorize pertinent guidance? 8
  • 9. The Solution - Mnemosyne Flashcards? Really? 9
  • 10. The Solution - Mnemosyne More than flashcards Memorization based on the spacing effect Research based spaced repetition algorithm Handles text, images and sound Open source software Cross-platform (Windows, Mac and Linux) Learn at your own pace 10
  • 11. The Solution – FISMArts Focused on providing FISMA and federal Information Assurance training material Uses authoritative source documents from NIST and OMB to create Mnemosyne content Development is simple and flexible Simply asks questions that can be answered by information in authoritative documents User rates their response If they do poorly they are asked more frequently If they do well they are asked less frequently 11
  • 12. The Solution – FISMArts Content is sourced strictly from: Published Federal documents (public domain) Data sources with Creative Commons compatible licenses User generated contributions Content is licensed under the Creative Common Attribution-Share Alike 3.0 United States License 12
  • 13. The Process – One Use Case Moving from source document to Mnemosyne Review document to identify important details Find line which describes the detail Formulate question answered by line Write question and line to a single line in a text file, separated by a tab character Import file into Mnemosyne Save file and distribute 13
  • 14. The Process – Anything Is Possible Want to provide a tool to train staff to spot physical security problems? Take a picture of an example and ask staff to rate their response Want to help staff learn organizational policy? The authoritative document is your policy Development is simple so testing different solutions is easy. 14
  • 16. Resources FISMArts – http://fismapedia.org/index.php?title=FISMArts FISMApedia – http://fismapedia.org Mnemosyne Project– http://www.mnemosyne-proj.org/ 16
  • 18. Contact Information Daniel Philpott Email: danphilpott@gmail.com Twitter: @danphilpott Telephone: (301) 825-5722 http://fismapedia.org 18