FREE RESOURCES

 

(ISC)²: Cybersecurity Assessments in Mergers and Acquisitions

Cisco 2017 Annual Cybersecurity Report

Cybersecurity audits are now essential to the mergers and acquisitions (M&A) process. An organization’s cybersecurity tools and practices,and overall security posture, can determine the fate of a deal.

 

(ISC)²: Strategies for Building and Growing Strong Cybersecurity Teams

Cisco 2017 Annual Cybersecurity Report

This report provides details on the cybersecurity workforce by taking a closer look at cybersecurity professionals and their teams, reviewing key steps on the cybersecurity career path, and discussing insights into building qualified and resilient cybersecurity teams.

 

(ISC)²: Women in Cybersecurity

Cisco 2017 Annual Cybersecurity Report

Even though men outnumber women in cybersecurity by three to one, more women are joining the field – and they are gunning for leadership positions. See why young and educated women are ready to take charge.

 

11 Types of Phishing Attacks You Need to Know to Stay Safe

Cisco 2017 Annual Cybersecurity Report

Phishing has evolved from a single technique into many highly specialized tactics, each adapted to specific types of targets and technologies. Here are 11 common phishing tactics you should know.

 

CISA Cyber Essentials

Cisco 2017 Annual Cybersecurity Report

This two-page guide for leaders and IT professionals will help you understand how to reducing your organization's cyber risk by building a culture of cyber readiness.

 

Cisco Cybersecurity Report 2020

Cisco 2017 Annual Cybersecurity Report

With the Cisco 2020 Annual Cybersecurity Report, you will take a closer look at security vendors, how security can be reimagined and the impact of alert management.

 

CompTIA: How to Prepare Partners to Move Quickly, Responsibly

How-to-Prepare-Partners-to-Move-Quickly-Responsibly-CreatingNewPackages-to-Protect-Customers-NewRemoteWorkforces

Learn how a cybersecurity vendor packaged its solutions to help solution providers, MSPs, and their customers pivot to protect remote workforces from the latest threats amid the COVID-19 pandemic.

 

CSA's Perspective on Cloud Risk Management

CSA-RiskManagement-Update

This whitepaper initiates a debate within the cloud and risk management communities on the suitability of existing methodologies and practices to effectively and efficiently assess, treat and mitigate, and monitor cybersecurity risks in the cloud.

 

EC-Council: A CISO's Top Priorities During COVID-19

CISOs-top-priorities-during-COVID-19

This paper discusses the role of CISO in creating a secure work from home (WFH) policy for employees as a by-product of COVID-19 pandemic.

 

EC-Council: How to Create an Effective Disaster Recovery Plan in 5 Steps

How-to-Create-an-Effective-Disaster-Recovery-Plan-in-5-Steps

A disaster is anything that threatens the function of a business, ranging from a computer virus to a huge earthquake. A well thought-out disaster recovery plan can play a vital role in business continuity. See how you can create one in five steps.

 

EC-Council: Role of Pen Tester in Ethical Hacking

Cisco 2017 Annual Cybersecurity Report

Penetration testing is more of an art than a science. It is the process of trying to gain unauthorized access to authorized resources. To put simply, Penetration testing is “breaking into your system” to see how hard it is to do.

 

IBM Security: Cyber Resilient Organization Report 2020

IBMSecurityCyberResilientOrganizationReport2020

The fifth annual Cyber Resilient Organization Report from IBM Security is based on research from IT and security professionals around the world, focusing on an organization's ability to detect, prevent, contain and respond to cybersecurity incidents.

ISACA: Privacy Beyond Compliance

Cisco 2017 Annual Cybersecurity Report

This white paper examines today’s privacy context and the way boards of directors oversee compliance with privacy regulations. It explores the human impact of privacy and the fact that data should be treated with dignity and respect.

NIST Special Publication: Zero Trust Architecture

ZeroTrustArchitecture-NIST

Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses from static, network-based perimeters to focus on users, assets, and resources. This document gives general deployment models and use cases where zero trust could improve an enterprise’s overall information technology security posture.

The Six Pillars of DevSecOps: Automation

Cisco 2017 Annual Cybersecurity Report

This document provides a framework to enable automation to transparently integrate security into the software development lifecycle by enabling a fast flow of security related information to DevOps teams and allowing a balanced approach to software development.