About the
(ISC)² Blog

  • (ISC)² believes in the importance of open dialogue and collaboration, between both (ISC)², its certified members and members of business and society.

    (ISC)² established this blog to provide a voice to its certified members, who have significant knowledge and valuable insights to share that can benefit the information security industry, the people in it and the public at large.

    The postings on this site are the author's own and don't necessarily represent
    (ISC)²'s positions, strategies or opinions. (ISC)² does not control, monitor, or endorse any links provided in this blog and makes no warranty or statement regarding the content on any linked website.

    Those who post comments to blogs should ensure their comments are focused on the topic at hand. (ISC)² reserves the right to remove any post or comment from this site.

    Should you find objectionable content in this blog, please notify us as soon as possible at blog@isc2.org.

    Please click here for FAQs.

    Please click here for the Blog guidelines.

« You Oughta Know Better! | Main | Sumitomo scammers guilty »

03 March 2009


TrackBack URL for this entry:

Listed below are links to weblogs that reference Consensus Audit Guidelines - What is the consensus?:


And add to this is anonymous origin - everybody who commented noticed that its "consensus" aspect is ... eh, how should I say it? ... unproven?

Thank you for this thoughtful and even handed analysis of the Consensus Audit Guidelines. I've been following the CAG since its December announcement and have been surprised at the lack of critical analysis of the project. It's a pleasure to see someone take the time to carefully consider the project and how it may or may not fit into the Federal security ecosystem.

The comments to this entry are closed.

Recent Contributors

Past Contributors