
A decade in React, JavaScript, and other languages
As 2026 began, I was immersed in a project Iβd launched earlier in the year, one full of promise, as they often are. Instead of watching the ball drop, I savored falling snow, a solid cup of coffee, and progress on a golf app for our office tournament.
Scrolling
Joe AlongiBSidesDayton is still looking for a handful of sponsors for our event May 23rd, 2026! If you know of a company that would be interested, please get them in contact with us!
Tickets are on sale now!
https://www.eventbrite.com/e/bsidesdayton-tickets-1975315383486
#bsides #infosec #infosecurity #InfoSecCommunity #informationsecurity #informationsecurity #informationtechnology
BSidesDayton
BSidesDayton is a community-driven information security conference offering hands-on learning and collaboration for security pros.
EventbriteWhen evaluating the risk applied to a project, elevated by the interactions of CUI, for U.S. and DoW standards, the focus is to maintain the organizations business continuity. #Applications #Cybersecurity #InformationSecurity #ChaosEngineering
https://joealongi.dev/business-process-plan-for-federal-technology-fedramp/

Business process plan for Federal Technology (FedRAMP)
In an ongoing contract with the federal government of the United States or Department of War (DoW), a business will need to stay compliantβ¦
Joe Alongi
Incident response plan for Healthcare Technology (HITECH)
In response to cyber-attacks against a healthcare organization, a primary objective of this plan is to protect data, reduce costs, limitβ¦
Joe AlongiWhen handling information in a secure system a layered approach provides unequivocal stages of security that require more involvement, the deeper the access goes. #Applications #Cybersecurity #InformationSecurity #ChaosEngineering
https://joealongi.dev/common-risk-profile-for-healthcare-technology-hitech/

Common risk profile for Healthcare Technology (HITECH)
As a healthcare information technology system (HITS), storing protected healthcare information (PHI), from labs, hospitals, governments andβ¦
Joe Alongiπππ€βπ¨ π§ππ¨π₯π€π£π¨πππ‘π ππ€π§ π₯π§π€π©πππ©ππ£π πππ©π π€π£ πͺπ£πͺπ¨ππ πππ§ππ¬ππ§π
#cybersecurity #informationsecurity #iso27001 #dora #digitaltransformation #cybergovernance #odit #isms #riskmanagement
As an interactive document to establish precedence for network security, disaster recovery (DR), and business continuity (BC), a network security plan stands as a handbook. #Applications #Cybersecurity #InformationSecurity #ChaosEngineering
https://joealongi.dev/network-security-plan-for-financial-technology-fintech/

Network security plan for Financial Technology (FinTech)
As an interactive document to establish precedence for network security, disaster recovery (DR), and business continuity (BC), a networkβ¦
Joe AlongiIn the complex world of cybersecurity and the ever-evolving technology that it works to protect, there are continuously enumerating challenges in the daily threat posture. #Applications #Cybersecurity #InformationSecurity #ChaosEngineering
https://joealongi.dev/vulnerability-management-program-for-financial-technology-fintech/

Vulnerability management program for Financial Technology (FinTech)
In the complex world of cybersecurity and the ever-evolving technology that it works to protect, there are continuously enumeratingβ¦
Joe Alongi