- DocumentOWASP-Top-10-for-LLMs-2023-v1_1 (2) (1)uploaded byMaya M
- DocumentDPPFuploaded byMaya M
- DocumentDCPP Training Program Set2 v0.5 -- Maya Misrauploaded byMaya M
- DocumentNASSCOM_COVID-19_Economic_Packages_Tracker_April_2020uploaded byMaya M
- DocumentVendor-Risk-Management-Demystified_joa_Eng_0715(1)uploaded byMaya M
- DocumentIntegrating-KRIs-and-KPIs-for-Effective-Technology-Risk-Management_joa_Eng_0718(1)uploaded byMaya M
- DocumentE-Governance-of-Currencies_joa_Eng_0318uploaded byMaya M
- Documentcloud-controls-matrix-v3.0.1-080319 (1).xlsxuploaded byMaya M
- DocumentImplementing a Privacy Protection Programuploaded byMaya M
- Documentey-understanding-the-cybersecurity.pdfuploaded byMaya M
- Documentcism (1)uploaded byMaya M
- Documentgx-gra-take-the-lead-on-cyber-riskuploaded byMaya M
- Document92305106-cism.pdfuploaded byMaya M
- DocumentIndusLaw_views_on_Data_Protection_in_India (1)uploaded byMaya M
- DocumentNIST.SP.800-53r4 (1).pdfuploaded byMaya M
- DocumentNIST.IR.8062.pdfuploaded byMaya M
- DocumentNIST.SP.800-53r4.pdfuploaded byMaya M
- Documentnistir_8062_draft.pdfuploaded byMaya M
- Documentin-ra-india-draft-personal-data-protection-bill-noexpuploaded byMaya M
- DocumentWeb-Monitoring-From-Big-Data-to-Small-Data-Analysis-Through-OSINT_joa_Eng_0218.pdfuploaded byMaya M
- DocumentEncryption-in-the-Hands-of-End-Users_joa_Eng_0516uploaded byMaya M
- Documentfraud-risk-management.pdfuploaded byMaya M
- Documentey-an-integrated-vision-to-manage-cyber-risk.pdfuploaded byMaya M
- DocumentDesign_of_Risk_Assessment_Process.pdfuploaded byMaya M
- Document2017 RC Profile A4 size_Electronic version_English FINAL (002).pdfuploaded byMaya M
- Documentey-understanding-the-cybersecurity.pdfuploaded byMaya M
- DocumentDeloitte Cyber Risk capabilities in EMEA.pdfuploaded byMaya M
- Documentcyber-security-oversight-in-the-boardroom-2016-au.pdfuploaded byMaya M
- Documentey-understanding-the-cybersecurity (1).pdfuploaded byMaya M
- Documentgx-ers-cyber-security-everybodys-imperativeuploaded byMaya M
- Documente_y_final_report.pdfuploaded byMaya M
- Documentcyber-security-oversight-in-the-boardroom-2016-au (1).pdfuploaded byMaya M
- Document[6401]code_review_checklist.pdfuploaded byMaya M
- Documentey-an-integrated-vision-to-manage-cyber-risk.pdfuploaded byMaya M
- Document201801230436321559270MEOOralQuestionsPart1 (1).pdfuploaded byMaya M
- Documentrevitalizing-privacy-trust-in-data-driven-world.pdfuploaded byMaya M
- Documentimgtopdf_generated_1302201533042uploaded byMaya M
- Document201307111147396113281m82011.pdfuploaded byMaya M
- Document201307111147396113281m82011uploaded byMaya M
- DocumentExam-Candidate-Guide-Continuous-Testing.pdfuploaded byMaya M