User talk:Sean p connors

New article - Capability Maturity Model Cybersecurity CMM
The existing Capability Maturity Model.  CMM Cybersecurity, is a measurement model which is the same as the Capability Maturity Model but extends specifically to cybersecurity. The CMM Cybersecurity provides the framework to measure capability across the spectrum's of cybersecurity.

Existing measurement of computer systems using capability maturity modeling (CMM) and the use of Capability Maturity Model Integration which guides the process of development and integration, specific to cybersecurity.

regard old article Cybersecurity Strategy 5 Layout Capability Maturity Model CS5L CMM
Dear Winner42, Thank you in advance for reviewing and approving my article on CS5L CMM. I would like to provide you with some background what would not necessary be in the article. I have been working on this model, CS5L CMM for a few years now, and although it has been adopted by some state governments and companies it has not made its way to Wikipedia. As you may see in my references that there was an attempt to develop a capability maturity model in the energy sector which did not get past C2M2. This measurement model CMM is quickly becoming a standard in the industry to fill a void. There is great need for a measurement much like credit scoring in the cyber security world, to enable vendors to measure agents that they do business with. We have developed a web based SAAS UI that allows companies to independently have access to an easy to use interface to collect data and measure their security. This is an open system, (free) and is developed in the spirit of maturing capability nationwide. Our company, Systems Soft Technologies derive revenue from developing IT systems in the USA, and we do not derive income from this system, rather it is our selfish intent to have companies that we deploy systems in, measure and improve their defense, so as to protect our work. We are the driving force on developing the initiative with the AIF Associated industries of Florida, as you see in my article. I hope the credentials accompanying my article suffice, as I have the dilemma that a lot of content, certainly the idea itself, has been authored by me, and therefore I find no reference is this new and developing field. Regards, Sean Connors


 * Hello, the problem you are having is that it may simply be too soon for this article to be added to Wikipedia. Wikipedia relies on independent sources such as news articles or publications to show that your topic (in this case the model) is notable.  As the field develops and if your service becomes notable in the future, then it will merit a Wikipedia article. The notability needs to come first as Wikipedia is not a place to promote your service.  I would also suggest reading our Conflict of Interest guidelines as it appears you may have one. Thank you for your time. Winner 42  Talk to me!  16:19, 4 May 2015 (UTC)

AfC notification: Draft:Cybersecurity Strategy 5 Layout Capability Maturity Model has a new comment
 I've left a comment on your Articles for Creation submission, which can be viewed at Draft:Cybersecurity Strategy 5 Layout Capability Maturity Model. Thanks! StarryGrandma (talk) 03:42, 11 December 2015 (UTC)

MfD nomination of Draft:Cybersecurity Strategy 5 Layout Capability Maturity Model
Draft:Cybersecurity Strategy 5 Layout Capability Maturity Model, a page which you created or substantially contributed to, has been nominated for deletion. Your opinions on the matter are welcome; you may participate in the discussion by adding your comments at Wikipedia:Miscellany for deletion/Draft:Cybersecurity Strategy 5 Layout Capability Maturity Model and please be sure to sign your comments with four tildes ( ~ ). You are free to edit the content of Draft:Cybersecurity Strategy 5 Layout Capability Maturity Model during the discussion but should not remove the miscellany for deletion template from the top of the page; such a removal will not end the deletion discussion. Thank you. StarryGrandma (talk) 16:58, 16 December 2015 (UTC)

File:CS5L CMM Diagram.png listed for discussion
A file that you uploaded or altered, File:CS5L CMM Diagram.png, has been listed at Files for discussion. Please see the to see why it has been listed (you may have to search for the title of the image to find its entry). Feel free to add your opinion on the matter below the nomination. Thank you. Ningauble (talk) 14:55, 30 July 2016 (UTC)

Nomination of Cybersecurity CS5L CMM for deletion
A discussion is taking place as to whether the article Cybersecurity CS5L CMM is suitable for inclusion in Wikipedia according to Wikipedia's policies and guidelines or whether it should be deleted.

The article will be discussed at Articles for deletion/Cybersecurity CS5L CMM until a consensus is reached, and anyone is welcome to contribute to the discussion. The nomination will explain the policies and guidelines which are of concern. The discussion focuses on high-quality evidence and our policies and guidelines.

Users may edit the article during the discussion, including to improve the article to address concerns raised in the discussion. However, do not remove the article-for-deletion notice from the top of the article. StarryGrandma (talk) 05:36, 29 April 2017 (UTC)