Content

-
Content, Incident PlaybooksMEHARI 2010: Processing guide for risk analysis and managementSKU: MEHARI 2010: Processing guide for risk analysis and managementThis guide presents MEHARI overall processing for risk analysis and treatment and describes the diff ...
-
Content, StandardsISO27005:2008 Information Security Risk ManagementSKU: ISO27005:2008 Information Security Risk ManagementThis International Standard provides guidelines for information security risk management. This suppo ...
-
Content, StandardsISO 31000:2009 Risk managementSKU: ISO 31000:2009 Risk managementThe purpose of the risk management framework is to assist the organization in integrating risk manag ...
-
Content, CybersecurityCybersecurity Capability Maturity Model (C2M2) Version 2.0SKU: Cybersecurity Capability Maturity Model (C2M2) Version 2.0The Cybersecurity Capability Maturity Model can help organizations of all sectors, types, and sizes ...
-
Content, Incident PlaybooksInsider Abuse Incident Response PlaybookSKU: Insider Abuse Incident Response PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksGroup Policy Modification Incident Response PlaybookSKU: Group Policy Modification Incident Response PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksDrive By Compromise Incident Response PlaybookSKU: Drive By Compromise Incident Response PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksCredential Access (Unsecured Credentials) Incident Response PlaybookSKU: Credential Access (Unsecured Credentials) Incident Response PlayThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksSocial Engineering Incident Response PlaybookSKU: Social Engineering Incident Response PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksScam Incident Response PlaybookSKU: Scam Incident Response PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksResource Development (Compromise Accounts) Incident Response PlaybookSKU: Resource Development (Compromise Accounts) Incident Response PlaThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksPhishing Incident Response PlaybookSKU: Phishing Incident Response PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksMoney Mule Scams (CEO Fraud) Incident Response PlaybookSKU: Money Mule Scams (CEO Fraud) Incident Response PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksMalware Incident Response PlaybookSKU: Malware Incident Response PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksDevice Theft/Loss Incident Response PlaybookSKU: Device Theft/Loss Incident Response PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksDenial of Service (DOS) Incident Response PlaybookSKU: Denial of Service (DOS) Incident Response PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksDefense Evasion (Disabling Security Software) Incident Reponse PlaybookSKU: Defense Evasion (Disabling Security Software) Incident Reponse PThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksCyber Blackmail Incident Reponse PlaybookSKU: Cyber Blackmail Incident Reponse PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksCredential Access (Password Spraying) Incident Response PlaybookSKU: Credential Access (Password Spraying) Incident Response PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksCreate Account (Backdoor User Accounts) Incident Response PlaybookSKU: Create Account (Backdoor User Accounts) Incident Response PlaybThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksCloud Email Compromise Incident Response PlaybookSKU: Cloud Email Compromise Incident Response PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksRansomware Incident Response PlaybookSKU: Ransomware Incident Response PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, PrivacyNIST Privacy FrameworkSKU: NIST Privacy FrameworkNIST Privacy Framework is a tool for improving privacy through Enterprise Risk Management (Privacy F ...
-
Content, Control setsCERT NZ's Top ten critical controlsSKU: CERT NZ's Top ten critical controlsCERT NZ ten critical controls for 2020 are intended to help you decide what to spend your time and m ...
-
Content, CybersecurityEBA Guidelines on ICT and security risk managementSKU: EBA Guidelines on ICT and security risk managementThese guidelines set out how financial institutions should manage the ICT and security risks that th ...
-
Content, PrivacyNational Security Framework - SpainSKU: National Security Framework - SpainThe purpose of this royal decree is to regulate the National Security Framework established in Artic ...
-
Content, RegulationsUK Privacy and Electronic CommunicationSKU: UK Privacy and Electronic CommunicationThe Privacy and Electronic Communications (EC Directive) Regulations 2003 is a law in the United Ki ...
-
Content, LegislationTaiwan Personal Data Protection Act (PDPA)SKU: Taiwan Personal Data Protection Act (PDPA)The laws and regulation regarding collection, processing and use of personal data in Taiwan is cove ...
-
Content, LegislationThailand PDPASKU: Thailand PDPAThailand's PDPA (Personal Data Protection Act) laws offer data protection regulations against the mi ...
-
Content, LegislationNetherlands - Personal Data Protection ActSKU: Netherlands - Personal Data Protection ActThis Act covers the GDPR requirements and relates to the protection and processing of data within th ...