Content

Content

Items 31-60 of 290

per page
Set Descending Direction
  1. Content, Incident Playbooks
    MEHARI 2010: Processing guide for risk analysis and management
    SKU: MEHARI 2010: Processing guide for risk analysis and management
    This guide presents MEHARI overall processing for risk analysis and treatment and describes the diff ...
  2. Content, Standards
    ISO27005:2008 Information Security Risk Management
    SKU: ISO27005:2008 Information Security Risk Management
    This International Standard provides guidelines for information security risk management. This suppo ...
  3. Content, Standards
    ISO 31000:2009 Risk management
    SKU: ISO 31000:2009 Risk management
    The purpose of the risk management framework is to assist the organization in integrating risk manag ...
  4. Content, Cybersecurity
    Cybersecurity Capability Maturity Model (C2M2) Version 2.0
    SKU: Cybersecurity Capability Maturity Model (C2M2) Version 2.0
    The Cybersecurity Capability Maturity Model can help organizations of all sectors, types, and sizes ...
  5. Content, Incident Playbooks
    Insider Abuse Incident Response Playbook
    SKU: Insider Abuse Incident Response Playbook
    This Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
  6. Content, Incident Playbooks
    Group Policy Modification Incident Response Playbook
    SKU: Group Policy Modification Incident Response Playbook
    This Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
  7. Content, Incident Playbooks
    Drive By Compromise Incident Response Playbook
    SKU: Drive By Compromise Incident Response Playbook
    This Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
  8. Content, Incident Playbooks
    Credential Access (Unsecured Credentials) Incident Response Playbook
    SKU: Credential Access (Unsecured Credentials) Incident Response Play
    This Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
  9. Content, Incident Playbooks
    Social Engineering Incident Response Playbook
    SKU: Social Engineering Incident Response Playbook
    This Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
  10. Content, Incident Playbooks
    Scam Incident Response Playbook
    SKU: Scam Incident Response Playbook
    This Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
  11. Content, Incident Playbooks
    Resource Development (Compromise Accounts) Incident Response Playbook
    SKU: Resource Development (Compromise Accounts) Incident Response Pla
    This Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
  12. Content, Incident Playbooks
    Phishing Incident Response Playbook
    SKU: Phishing Incident Response Playbook
    This Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
  13. Content, Incident Playbooks
    Money Mule Scams (CEO Fraud) Incident Response Playbook
    SKU: Money Mule Scams (CEO Fraud) Incident Response Playbook
    This Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
  14. Content, Incident Playbooks
    Malware Incident Response Playbook
    SKU: Malware Incident Response Playbook
    This Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
  15. Content, Incident Playbooks
    Device Theft/Loss Incident Response Playbook
    SKU: Device Theft/Loss Incident Response Playbook
    This Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
  16. Content, Incident Playbooks
    Denial of Service (DOS) Incident Response Playbook
    SKU: Denial of Service (DOS) Incident Response Playbook
    This Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
  17. Content, Incident Playbooks
    Defense Evasion (Disabling Security Software) Incident Reponse Playbook
    SKU: Defense Evasion (Disabling Security Software) Incident Reponse P
    This Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
  18. Content, Incident Playbooks
    Cyber Blackmail Incident Reponse Playbook
    SKU: Cyber Blackmail Incident Reponse Playbook
    This Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
  19. Content, Incident Playbooks
    Credential Access (Password Spraying) Incident Response Playbook
    SKU: Credential Access (Password Spraying) Incident Response Playbook
    This Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
  20. Content, Incident Playbooks
    Create Account (Backdoor User Accounts) Incident Response Playbook
    SKU: Create Account (Backdoor User Accounts) Incident Response Playb
    This Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
  21. Content, Incident Playbooks
    Cloud Email Compromise Incident Response Playbook
    SKU: Cloud Email Compromise Incident Response Playbook
    This Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
  22. Content, Incident Playbooks
    Ransomware Incident Response Playbook
    SKU: Ransomware Incident Response Playbook
    This Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
  23. Content, Privacy
    NIST Privacy Framework
    SKU: NIST Privacy Framework
    NIST Privacy Framework is a tool for improving privacy through Enterprise Risk Management (Privacy F ...
  24. Content, Control sets
    CERT NZ's Top ten critical controls
    SKU: CERT NZ's Top ten critical controls
    CERT NZ ten critical controls for 2020 are intended to help you decide what to spend your time and m ...
  25. Content, Cybersecurity
    EBA Guidelines on ICT and security risk management
    SKU: EBA Guidelines on ICT and security risk management
    These guidelines set out how financial institutions should manage the ICT and security risks that th ...
  26. Content, Privacy
    National Security Framework - Spain
    SKU: National Security Framework - Spain
    The purpose of this royal decree is to regulate the National Security Framework established in Artic ...
  27. Content, Regulations
    UK Privacy and Electronic Communication
    SKU: UK Privacy and Electronic Communication
    The Privacy and Electronic Communications (EC Directive) Regulations 2003 is a law in the United Ki ...
  28. Content, Legislation
    Taiwan Personal Data Protection Act (PDPA)
    SKU: Taiwan Personal Data Protection Act (PDPA)
    The laws and regulation regarding collection, processing and use of personal data in Taiwan is cove ...
  29. Content, Legislation
    Thailand PDPA
    SKU: Thailand PDPA
    Thailand's PDPA (Personal Data Protection Act) laws offer data protection regulations against the mi ...
  30. Content, Legislation
    Netherlands - Personal Data Protection Act
    SKU: Netherlands - Personal Data Protection Act
    This Act covers the GDPR requirements and relates to the protection and processing of data within th ...

Items 31-60 of 290

per page
Set Descending Direction