OUR BLOG
News and Insights
The latest industry news, interviews, technologies, and resources.
Public Comments are open for Final Report EBA Guidelines on ICT and security risk management
The UCF Team invites you to review and provide feedback on the mapping of Final Report EBA...
Public Comments are open for COVID-19 Strategic Preparedness and Response Plan, OPERATIONAL PLANNING GUIDELINES TO SUPPORT COUNTRY PREPAREDNESS AND RESPONSE, Draft as of 12 February 2020
The UCF Team invites you to review and provide feedback on the mapping of COVID-19 Strategic...
Public Comments are open for Cybersecurity Maturity Model Certification, Cybersecurity Maturity Model Certification, Version 1.0, Level 1
The UCF Team invites you to review and provide feedback on the mapping of Cybersecurity Maturity...
Public Comments are open for Cybersecurity Maturity Model Certification, Cybersecurity Maturity Model Certification, Version 1.0, Level 2
The UCF Team invites you to review and provide feedback on the mapping of Cybersecurity Maturity...
Public Comments are open for ISO/IEC 19770-1, Information technology — IT asset management — Part 1: IT asset management systems — Requirements, Third Edition, 2017-12
The UCF Team invites you to review and provide feedback on the mapping of ISO/IEC 19770-1,...
Public Comments are open for Pipeline Security Guidelines
The UCF Team invites you to review and provide feedback on the mapping of Pipeline Security...
Public Comments are open for Cybersecurity Maturity Model Certification, Cybersecurity Maturity Model Certification, Version 1.0, Level 3
The UCF Team invites you to review and provide feedback on the mapping of Cybersecurity Maturity...
Public Comments are open for Hong Kong Monetary Authority Supervisory Policy Manual SA-2 Outsourcing, V.1-28.12.01
The UCF Team invites you to review and provide feedback on the mapping of Hong Kong Monetary...
Public Comments are open for Cybersecurity Maturity Model Certification, Cybersecurity Maturity Model Certification, Version 1.0, Level 4
The UCF Team invites you to review and provide feedback on the mapping of Cybersecurity Maturity...