MQCC®
National (Federal) Standards-based Services Process
for MQCC® CYBERLOCKCHAIN™ Risk-based Cybersecurity Services (RBCS™)
MQCC® CYBERLOCKCHAIN™ brand Federated (distributed) Quantum Generative Hybrid Human-AI™ (QG-HHAI™) Higher Level (Meta)™
MQCC®: Global Leadership in Risk-based Cybersecurity (RBCyb™)
Think CYBERLOCKCHAIN™, Think National (Federal) Standards
There is no better, trusted, consensus standard of trust.
Standards Trusted in 118+ Countries
MQCC® Answers the CEO question: "WHAT MORE COULD YOU DO?"
MQCC®: UK, USA, Canada; Defense-Standard; Military Grade of Quality
MQCC®: Textbook; Read to Learn
The relationship between MQCC®, MQCC® Standards and MQCC®: UK, USA, Canada; Defense-Standard; Military Grade of Quality
MQCC® CYBERLOCKCHAIN™ brand of Federated (distributed), Quantum Generative, Hybrid Human-AI™ (QG-HHAI™) Higher Level (Meta)™ Military-Grade, Defense-Standard, Risk-based, Cybersecurity Infrastructure
Ebook Edition: Apr 2024
English Language
ISBN: 978-1-989758-58-8
(PDF-based E-Book; sold via Amazon® & Google® Platforms)
World BlockChain Day® Text Series Book #52
Published by MQCC™, Meta Quality Conformity Control Organization, incorporated as MortgageQuote Canada Corp.
MQCC®: Your Higher Level of Trust™: FOR CEO's BY CEO's™ for Risk-based Cybersecurity Services (RBCS™)
MQCC® CYBERLOCKCHAIN™ Risk-based Cybersecurity: Small yet Important
Merely one component of an organization's existence
Remember, the domain and discipline of cybersecurity is only a "small" yet important part of an organization's existence; see the MQCC® ARCHANGEL™ BLOCKCHAIN OPERATING SYSTEM (BLOCKCHAIN OPSYS™) infographic to see for yourself:
MQCC® ARCHANGEL™ BLOCKCHAIN OPERATING SYSTEM (BLOCKCHAIN OPSYS™)
CYBERLOCKCHAIN™ Drawing 1
For Any Size of Organization; Top Management: (Founder-, Chief-, Executive-) Officer; SLEEP WELL AT NIGHT™
MQCC® ACCREDITED CLASS® Organization System of Management (OSOM™)
Functional Domains
MQCC® Bungay International Technology (BIT™) Federal National and International Standards-based Management of Certainty in Organizations (COIN™) Utility Function
Trusted in 118+ Countries
MQCC® ZERO ONE® ACCREDITED CLASS® Transforming Uncertainty to Certainty: TRUSTED BY BILLIONS®
MQCC® National (Federal) Standards-based Services Process for Risk-based Cybersecurity (RBCyb™)
Your Pathway to Discovery™ to MQCC® CYBERLOCKCHAIN™ brand of Risk-based Cybersecurity Services (RBCS™)
MQCC® Roles by Priority:
Manager (Management Team) - oversee others doing work as per organization requirements
Computer and information systems managers
MQCC® Computer and information systems managers plan, organize, direct, control and evaluate the activities of organizations that analyze, design, develop, implement, operate and administer computer and telecommunications software, networks and information systems.
MQCC® serves both public and private sectors.
all disciplines, including:
Business systems manager
Cloud architect manager
Cloud solutions architect manager
Computer systems manager
Data centre manager
Data processing and systems analysis manager
Data processing director
Electronic data processing (EDP) manager
Enterprise resource planning (ERP) manager
Information systems manager
Management information system (MIS) manager
Software development manager
Software engineering manager
Systems development manager
Technical delivery manager - information technology (IT)
Technical program manager - information technology (IT)
Non-Manager (Operations Team) - do work as per organization requirements; overseen by a manager to assure quality performances by verifying work is completed in conformity to the requirements established by the organization
Cybersecurity specialists
Computer and information systems managers plan, organize, direct, control and evaluate the activities of organizations that analyze, design, develop, implement, operate and administer computer and telecommunications software, networks and information systems.
MQCC® serves both public and private sectors.
Other (synonymous) titles for the same cybersecurity work performance include:
Cybersecurity analyst
Cybersecurity consultant
Cybersecurity analyst
Informatics security analyst
Informatics security consultant
Information technology (IT) security specialist
Systems security analyst
Non-Cybersecurity specialists:
IT Consultant
Analyst – computer, computer systems, information systems
Information Systems – security analyst, analyst, quality assurance analyst
Systems auditor
Systems specialist
Not a complete list
Get started with MQCC® CYBERLOCKCHAIN™ brand of computer and scientific services; education services today; contact info@mqcc.org.
MQCC®: Setting Your Standard™
MQCC®: A TRUSTED STANDARD SETTER for Risk-based Cybersecurity Services (RBCS™)
What Standard does MQCC® Risk-based Cybersecurity (RBCyb™) Professionals possess?
MQCC® is a standard-setter in risk-based cybersecurity (RBCyb™) and possesses its own standard:
PROFESSIONAL BLOCKCHAINEER® (P. BCr.)®
Visit www.blockhaineer.org to learn more.
MQCC® also retains or works with other cybersecurity professionals with qualified designations. Email info@mqcc.org to pay for a consultation in order to learn about other risk-based cybersecurity (RBCyb™) qualified designations.
Get started with MQCC® CYBERLOCKCHAIN™ brand of computer and scientific services; education services today; contact info@mqcc.org.
MQCC®: Your High-Skilled Duty Provider
Risk-based Cybersecurity (RBCyb™ Professional) and Non-Risk-based Cybersecurity Person
MQCC® High-Skilled Non-Cybersecurity
MQCC® Non-Cybersecurity; Main Duties
Plan, organize, direct, control and evaluate the operations of information systems and electronic data processing (EDP) departments and companies
Develop and implement policies and procedures for electronic data processing and computer systems development and operations
Meet with clients to discuss system requirements, specifications, costs and timelines
Assemble and manage teams of information systems personnel to design, develop, implement, operate and administer computer and telecommunications software, networks and information systems
Control the budget and expenditures of the department, company or project
Recruit and supervise computer analysts, engineers, programmers, technicians and other personnel and oversee their professional development and training.
Education Requirements:
A bachelor's or master's degree in computer science, business administration, commerce or engineering is not unusual.
Several years of experience in systems analysis, data administration, software engineering, network design or computer programming, including supervisory experience, are helpful.
Work experience
Apprenticeship
Occupational examples:
Information systems analysis and consultation to:
analyze systems requirements,
develop and implement information systems development plans, policies and procedures, and
provide advice on a wide range of information systems issues
Business analysis and consultations with your to:
identify and document requirements,
conduct business and technical studies,
design, develop, integrate and implement information systems business solutions, and
provide advice on:
information systems strategy,
policy,
management,
security and
service delivery
Systems security analysis and consultations with you to:
identify and document requirements,
assess physical and technical security risks to data, software and hardware, and
develop policies, procedures and contingency plans to minimize the effects of security breaches
Information systems quality assurance analysis to develop and implement policies and procedures throughout your organization maturity life cycle to maximize the efficiency, effectiveness and overall quality of software products and information systems.
See: MQCC® Size, Maturity & Readiness of Organization Scale Graphic to learn more; found in the MQCC® CYBERLOCKCHAIN™ CEO CYBERSAFE™ Tools section of this webpage
Systems auditors conduct independent third-party reviews to assess quality assurance practices, software products and information systems.
Get started with MQCC® CYBERLOCKCHAIN™ brand of computer and scientific services; education services today; contact info@mqcc.org.
MQCC® High-Skilled Risk-based Cybersecurity (RBCyb™)
MQCC® High-Skilled Risk-based Cybersecurity (RBCyb™) DUTIES TO PEFORM
MQCC® Risk-based Cybersecurity (RBCyb™) Main Duties
ation systems analysis and consultation to:
analyze systems requirements,
develop and implement information system
Confer with clients to identify and document requirements, assess physical and technical security risks to data, software and hardware
Apply encryption protocols, and manage keys to ensure security of data is maintained while at rest and in transit
Monitor access and credentials for information and systems
Install, test and operate security software and tools such as anti-virus and automated threat detection/prevent systems to ensure security measures are in place and working as intended
Monitor for cyber attacks, intrusions and unusual, unauthorised or illegal activity
Plan and carry out security measures in response to risk-based cybersecurity (RBCyb™) events and incidents in accordance with an organization's incident response plan to protect information, data and systems
Document computer security and emergency measures policies, procedures, and tests.
Education Requirements:
A bachelor's degree in computer science, computer security, computer systems engineering, information systems or completion of a college program in information technology, network administration or other computer science related program is not unusual.
Certification or training provided by software vendors may be applicable.
Work experience
Apprenticeship
Cybersecurity analyst
Occupational examples:
Informatics security analyst
Informatics security consultant
Information technology (IT) security specialist
Systems security analyst
Get started with MQCC® CYBERLOCKCHAIN™ brand of computer and scientific services; education services today; contact info@mqcc.org.
MQCC® Exclusionary Occupational Roles to MQCC® Risk-based Cybersecurity (RBCyb™) CYBERLOCKCHAIN™ Services
Computer and information systems professionals
Computer engineers (except software engineers and designers)
Computer systems developers and programmers
Computing services company president (this is a role as Senior managers - financial, communications and other business services)
Software engineers and designers
Local area network (LAN) manager (this is role as Computer network and web technicians )
Computer and information systems managers
Computer engineers (except software engineers and designers)
Computer systems developers and programmers
Software developers and programmers
Database analysts and data administrators
Business systems specialists
Information systems specialists
Software engineers and designers
Web designers
Web developers and programmers
not a complete list
Other MQCC® departments provide these services. Visit www.mqcc.org to learn more.
Get started with MQCC® CYBERLOCKCHAIN™ brand of computer and scientific services; education services today; contact info@mqcc.org.
MQCC® Services based upon the BUNGAY LAW OF CERTAINTY™
Reducing your profit making environment uncertainty, negative certainty and increasing your profit making environment positive certainty.
MQCC® manager of the BUNGAY LAW OF CERTAINTY™:
Organizational Performance: The concept of "States of Certainty" states that certainty exists in three (3) forms (states)
a state of unmeasured uncertainty 😐
a state of measured negative certainty ☹️
a state of measurable positive certainty 🙂
MQCC® will help you transform from a state of measured uncertainty or measured negative uncertainty to a state of positive certainty. Know what is happening in your organization.
MQCC®: the BUNGAY LAW OF CERTAINTY™
CYBERLOCKCHAIN™ Drawing 2
Get started with MQCC® CYBERLOCKCHAIN™ brand of computer and scientific services; education services today; contact info@mqcc.org.
MQCC® New Customer Intake Steps & Services Process
Phase 1: Unknown Organization Infrastructure Condition (OIC™)
Need Assessment
Step 1:
Your Payment of Pre-Application Work Fee to MQCC®
At MQCC® You Pay For What You Get™
Step 2:
MQCC® KYC2™: Know Your Client - Know Your Company™ Application Form
Safety disclosure forms which you complete on your behalf and on your organization behalf (COIN™)
Step 3:
MQCC® Organization Infrastructure Assessment (OIA™)
Establish your current state of existence: MQCC® High Risk
MQCC® Medium Risk
MQCC® Low Risk
Phase 2: Analysis, Assessment & Problem-Solution Development based upon Organization Infrastructure Condition (OIC™)
Project Development
Step 4:
MQCC® Application Suggestion with 3rd Party Confirmation
Recommendation of applications based upon Step 3 Results; with a 3rd party confirmation; project development
Phase 3: Understanding; Implementation; Assessment; Continuous Improvement of Project based upon Organization Infrastructure Condition (OIC™)
Project Implementation, Assessment, Corrective Action, Continuous Improvement
Step 5:
Your Payment of Application Implementation Work Fee to MQCC®
Payment for Project which Contemplates Implementation of Suggestions based upon Step 4 Results
Step 6:
MQCC® Application Implementation
Implementation of Suggestions based upon Step 4 Results
Step 7:
MQCC® Application Training
Training for Implementation of Suggestions based upon Step 4 Results
Step 8:
MQCC® Results Assessment; Maintenance & Continuous Improvement
Analysis of Implementation of Suggestions project completion and implementation of corrective action and continuous improvement processes as required
Get started with MQCC® CYBERLOCKCHAIN™ brand of computer and scientific services; education services today; contact info@mqcc.org.