I champion the thoughtful coders, those brewing custom solutions, assembling hardware, coding deliberately and impeccably. #Applications #Cybersecurity #InformationSecurity #ChaosEngineering

https://joealongi.dev/a-decade-in-react-javascript-and-other-languages/

A decade in React, JavaScript, and other languages

As 2026 began, I was immersed in a project I’d launched earlier in the year, one full of promise, as they often are. Instead of watching the ball drop, I savored falling snow, a solid cup of coffee, and progress on a golf app for our office tournament. Scrolling

Joe Alongi

BSidesDayton is still looking for a handful of sponsors for our event May 23rd, 2026! If you know of a company that would be interested, please get them in contact with us!

Tickets are on sale now!

https://www.eventbrite.com/e/bsidesdayton-tickets-1975315383486

#bsides #infosec #infosecurity #InfoSecCommunity #informationsecurity #informationsecurity #informationtechnology

BSidesDayton

BSidesDayton is a community-driven information security conference offering hands-on learning and collaboration for security pros.

Eventbrite

When evaluating the risk applied to a project, elevated by the interactions of CUI, for U.S. and DoW standards, the focus is to maintain the organizations business continuity. #Applications #Cybersecurity #InformationSecurity #ChaosEngineering

https://joealongi.dev/business-process-plan-for-federal-technology-fedramp/

Business process plan for Federal Technology (FedRAMP)

In an ongoing contract with the federal government of the United States or Department of War (DoW), a business will need to stay compliant…

Joe Alongi

A secure device is only secure if its whole life is 𝘀𝘰𝘯𝘡𝘳𝘰𝘭𝘭𝘦π˜₯.

#cybersecurity #informationsecurity #iso27001 #dora #cybergovernance #digitaltransformation #legalcompliance #odit #isms
#riskmanagement #assetmanagement

When this incident response is completed an audit of the impacted resources and recovered information will be provided in an inventory. #Applications #Cybersecurity #InformationSecurity #ChaosEngineering

https://joealongi.dev/incident-response-plan-for-healthcare-technology-hitech/

Incident response plan for Healthcare Technology (HITECH)

In response to cyber-attacks against a healthcare organization, a primary objective of this plan is to protect data, reduce costs, limit…

Joe Alongi

When handling information in a secure system a layered approach provides unequivocal stages of security that require more involvement, the deeper the access goes. #Applications #Cybersecurity #InformationSecurity #ChaosEngineering

https://joealongi.dev/common-risk-profile-for-healthcare-technology-hitech/

Common risk profile for Healthcare Technology (HITECH)

As a healthcare information technology system (HITS), storing protected healthcare information (PHI), from labs, hospitals, governments and…

Joe Alongi

𝙒𝙝𝙀’𝙨 π™§π™šπ™¨π™₯π™€π™£π™¨π™žπ™—π™‘π™š 𝙛𝙀𝙧 π™₯π™§π™€π™©π™šπ™˜π™©π™žπ™£π™œ 𝙙𝙖𝙩𝙖 𝙀𝙣 π™ͺ𝙣π™ͺπ™¨π™šπ™™ π™π™–π™§π™™π™¬π™–π™§π™š

#cybersecurity #informationsecurity #iso27001 #dora #digitaltransformation #cybergovernance #odit #isms #riskmanagement

As an interactive document to establish precedence for network security, disaster recovery (DR), and business continuity (BC), a network security plan stands as a handbook. #Applications #Cybersecurity #InformationSecurity #ChaosEngineering

https://joealongi.dev/network-security-plan-for-financial-technology-fintech/

Network security plan for Financial Technology (FinTech)

As an interactive document to establish precedence for network security, disaster recovery (DR), and business continuity (BC), a network…

Joe Alongi

In the complex world of cybersecurity and the ever-evolving technology that it works to protect, there are continuously enumerating challenges in the daily threat posture. #Applications #Cybersecurity #InformationSecurity #ChaosEngineering

https://joealongi.dev/vulnerability-management-program-for-financial-technology-fintech/

Vulnerability management program for Financial Technology (FinTech)

In the complex world of cybersecurity and the ever-evolving technology that it works to protect, there are continuously enumerating…

Joe Alongi