Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
Pages: CISO2CISO Cyber Security Notepad Series for CISOs
Lastest Published Posts
Google
We’re All in this Together
CyberSN
U.S. Cybersecurity Job Posting Data Report
CISA | Cybersecurity and Infrastructure Security Agency
UNDERSTANDING AND RESPONDING TO DISTRIBUTED DENIAL-OF-SERVICE ATTACKS
McKinsey & Company
Transforming risk efficiency and effectiveness
Arnold Antoo
Zero Trust Security Model
Richea Perry
Your Cybersecurity Toolkit
IGNITE Technologies
Wireless Penetration Testing
Joas A Santos
Windows API for Red Team #101
Economic Research Working Paper
Artificial Intelligence and Intellectual Property
CASOS DE USO APLICABLES EN UN SIEM
IGNITE Technologies
Burp Suite for Pentester
The Institute of Internal auditors
Auditing Risk Culture
DevSecOps Guide
ATTACKING PHP APPLICATIONS
DevSecOps Guide
ATTACKING KUBERNETES WITH SECURITY BEST PRACTICE
CLTC WHITE PAPER SERIES
Guidance for the Development of AI Risk and Impact Assessments
Active Directory
Active Directory IT AuditChecklist
A guide to business continuity planning
LOG RHYTHM
Using MITRE ATT&CK™ in Threat Huntingand Detection
Kaspersky
H2 2023 – A brief overviewof main incidentsin industrial cybersecurity
Andrey Prozorov
24 Great Cybersecurity Frameworks
ENISA-EUROPA
SEGURIDAD DE TELECOMUNICACIONES
Project Management Institute
Building Resilience Through Strategic Risk Management
DATA LOSS PREVENTION (DLP)
AICSSolutions
Cybersecurity Red Team
cisco
Cyber Incident Response
CSR Cyber Security Council
EVERY BUSINESS HAS DUTIES OF CARE IN THE FIELD OF CYBER SECURITY
SYBEX
Cybersecurity ESSENTIALS
Agency for Digital Government
Cyber security in supplier relation ships
RINKU
Curso de introducción KALI LINUX PARA HACKERS ÉTICOS
CNIL
PRACTICE GUIDE GDPR
FERMA
THE ROADMAP TO STRATEGIC RISK MANAGEMENT
ENISA-EUROPA
Cyber Resilience Act Requirements Standards Mapping
CYTAD
Essential Data Privacy Checklist
SF-ISAC
Digital Operational Resilience Act
SYNGRESS
DIGITAL FORENSICS WITH Open Source TOOLS
IT REVOLUTION DEVOPS ENTERPRISE FORUM
DevOps Automated Governance Reference Architecture
SANS GIAC CERTIFICATIONS
Detecting Attacks on Web Applications from Log Files
EUROPEAN DATA PROTECTION SUPERVISOR
ANNUAL REPORT 2023
TechTarget
IT Disaster Recovery Plan Template
Opstune
IOC Scan Framework v2.0
Federal Office for Information Security
Indirect Prompt Injections
the Department of the Environment Climate and Communications
Guidelines on CyberSecurity Specifications
Edelman
INCIDENT RESPONSE REFERENCE GUIDE
Security METRICS
Security Metrics Guide to PCI DSS Compliance
SOC TIPS Cybersecurity
Guia de Resposta a Incidentes de Segurança para LGPD
CDCP
FIREWALL Audit CHECKLIST
GitGuardian
Secrets Management Maturity Model
MegaCorp One
Sample Penetration Test Report
FORTINET
Routing in FortiGate
FUTURE OF PRIVACY FORUM
Risk Framework Body Related Data (PD) Immersive Tech
ENISA
Remote ID Proofing Good Practices
Google
Why Red TeamsPlay a Central Rolein Helping OrganizationsSecure AI Systems
Red Canary
Threat Detection Report 2024
HADESS
Pwning the Domain Persistence
Australian Goverment
PROTECTIVE SECURITYPOLICY FRAMEWORKSecuring government business:Protective security guidance for executive
CISC (Comité Internacional Sobre Ciberseguridad)
Política Nacional de Ciberseguridad 2023-2028
Google
Perspectiveson Securityfor the Board
HADESS
OSINT Method for Map Investigations
CCN-CERT
Observatorio Riesgos Ciberseguridad 2024
CYBERTHEORY
The ISMG Cybersecurity Pulse Report 2024 is a treasure trove of insights from the RSA...
FORTINET
Bloking Malware Through Antivirus Security Profile in FortiGate
ENISA
Best Practices for Cyber Crisis Management
viehgroup
AWS Cloud Security Checklist
DevSecOps Guide
Attacking .NET
IGNITE Technologies
Advance Burp Suite Pentester Training (Online)
LogRhythm
Using MITRE ATT&CK™in Threat Huntingand Detection
INCIDENT RESPONSE PLAN
NIST CSF 2.0
Incident Response Recommendations and Considerations for Cybersecurity Risk Management
GmFaruk
Identity and Access Management Policy
UK HM Government
National Cyber Strategy 2022
NSA
NSA Network Infrastructure Security Guide
NIST
NIST Policy Template Guide
Thecyphere
Malware prevention tips for businesses
ministry of security
MERGERS AND ACQUISITIONS
THE LINUX FUNDATION
Linux Privilege Escalation
LogRhythm
How to build a SOC with limited resources
Kubernetes
Kubernetes and Cloud Native Associate (KCNA) Study Guide
Australian Government
Management structures and responsibilities
Hacker Combat
How are Passwords Cracked ? by Hacker Combat.
N/A
Security Metrics & KPIs for Measuring SOC Success – Measure Up: How SOC Metrics Elevate...
Sectrio
The Global OT & IoT Threat Landscape Assessment and Analysis rEPORT 2024 by Sectrio Threat...
ISA SECURE
The Case for ISA/IEC 62443Security Level 2 as a Minimumfor COTS Components
Huntress
2024 Cyber Threat Report
NACD - Intenet Security Alliance
2023 Director’s Handbook on Cyber-risk Oversight
Devoteam
14 Cybersecurity Trends for 2024
IGNITE Technologies
MEMORY FORENSICS VOLATILITY
CAREER UP
7 Steps to your SOC Analyst Career
National Cyber Security Centrum
Managing Insider Threats
Marcos Jaimovich
The Silent Spectre Haunting Your Network: QPhishing, the CISO’s Unspoken Nightmare.
Marcos Jaimovich
Goodbye to Traditional: Why Conventional Cybersecurity Tools are No Longer Sufficient for the Future of...
National Security Agency
CSI Cloud Top10 Key Management
CSA Cloud Security Alliance
Defining the Zero TrustProtect Surface
HANIM EKEN
CONTAINER SECURITY INTERVIEW QUESTIONS ANSWERS
CNIL
PRACTICE GUIDE GDPR – SECURITY OF PERSONAL DATA Version 2024
PWNED LABS
Cloud Security Engineer Roadmap
tutorialspoint.com
Cloud Computing Tutorial Simply Easy Learning
SMITHA SRIHARSHA
CISSP Preparation Notes
CISSP Mind Map: All Domains
Lansweeper
CIS 18 CRITICAL SECURITY CONTROLS CHECKLIST
Semaphore
CI-CD with Docker and Kubernetes
EC-MSP
BUSINESS CONTINUITY PLAN & DISASTER RECOVERY PLAN TEMPLATE
PWC
Building a risk-resilient organisation
Accenture
THE NEXT-GENERATION Building a Digital Central Bankfor a Digital Age
Thecyphere
Microsoft EntraID (Azure)ConditionalAccess
aws
AWS Security Incident Response Guide
Government of South Australian
South Australian Cyber Security Framework
NAO -National Audit Office
Audit and Risk Assurance Committee Effectiveness Tool
WWW. D E V S E COP S G U I D E S . CO M
Attacking Docker
W W W . D E V S E C O P S G U I D E S . C O M
Attacking AWS – Offensive Security Aproach
ENISA
Artificial Intelligence and Cybersecurity Research 2023
MuleSoft
API Security Best Practices – Protect your APIs with Anypoint Platform
Green Circle
All about Security Operations Center
DAZZ
A Guide to Building a Secure SDLC – Which Scanning Tools Should I look at,...
zimperium
2023 Mobile Banking Heists Report
40 under 40
40 under 40 in CyberSecurity 2024
HADESS
40 Days in DeepDark Web About Crypto Scam
Everbridge
8 Principles of Supply Chain Risk Management
CHAOSSEARCH
Threat Hunter’s Handbook – Using Log Analytics to Find and Neutralize Hidden Threats in Your...
ENDGAME
The Hunters Handbook Endgame’s Guide to Adversary Hunting
THE EU’S MOST THREATENING by EUROPOL
National Cyber Security Centre
Responding to a cyber incident – a guide for CEOs
IGNITE Technologies
CREDENTIAL DUMPING
HADESS
Pwning the Domain Lateral Movement
Jorgen Lanesskog
PING Basic IP Network Troubleshooting
TELESOFT
Layer 7 Visibility What are the Benefits?
TIGERA
Introduction to Kubernetes Networking and Security
Department of Defense's (DoD)
Defense Industrial Base Cybersecurity Strategy 2024
Dummies
Zero Trust Access for Dummies Fortinet
Homeland Security
Zero Trust Implementation Strategy
National Australia Bank Limited
Your Business and Cyber Security
CYFIRMA
Xeno RAT- A New Remote Access Trojan
IGNITE Technologies
Windows Persistence COM Hijacking MITRE T1546 015
IGNITE Technologies
Windows Exploitation Rundll32
IGNITE Technologies
Windows Exploitation Msbuild
HADESS
Web LLM Attacks
HADESS
Trended Protocols for Security Stuff
Red Iberoamericana de Protección de Datos
Transferencia Internacional de Datos Personales – Guia de Implementación
CYFIRMA
TRACKING RANSOMWARE January 2024
https://www.linkedin.com/in/harunseker/
TOP Cyber Attacks Detected by SIEM Solutions
TRAVARSA
Top 100 Cyber Threats and Solutions 2024
Top 50 Cybersecurity Threats
OWASP
Top 10 Considerations for Incident Response
EXECWEB
Tips for Cybersecurity Vendors to Connect with CISOs
WITH SECURE
Threat Landscape Report 2024
ThreatRadar
Threat Intel Roundup Phar SEO Poisoning ScreenConnect
ThreatRadar
Threat Intel Roundup Outlook, QNAP, Okta
ThreatRadar
Threat Intel Roundup Outlook SmartScreen Lockbit
ThreatRadar
Threat Intel Roundup FortiOS Super Bowl Chrome APT15
INFOSECTRAIN
Third Party Information Security Assessment Checklist
INFOSECTRAIN
THE ULTIMATE SOC – CAREER GUIDE FOR BEGINNERS
Waterfall Security Solutions LTD.
THE TOP 20 CYBERATTACKS on Industrial Control Systems
CSA Cloud Security Alliance
The State of SecurityRemediation 2024
THE LINUX FUNDATION
The Open Source Software Security Mobilization Plan by OpenSSF
HITRUST
The HITRUST Approach to NIST CSF 2.0
Gavin Phillips
The Deep and Dark Web Guide
The Computer and Information Security
Deloitte
The CISOs guide to Generative AI
Ahmed Medhat
Suspicious Traffic Detection and Analysis
KPMG
Supply Chain Risk Management – A data driven approach to protecting your organization
Standford University
Rethinking Privacy in the AI Era Policy Provocations for a Data-Centric World
Orangeava
Ultimate SplunkforCybersecurity
Michael Tchuindjang
Splunk – SIEM Log Monitoring
Spam and Phishing Report for 2023
iExperts
SOC Audit Report Type1 Type2
Cybersecurity & Infrastructure Security Agency
Secure Cloud Business Applications
OAG
Security Basics for ProtectingCritical Infrastructure fromCyber Threats
InstaSafe
TIPS TOAVOID ROMANCE SCAMS
GISF
Securityto go: A Risk Management Toolkit for Humanitarianaid Agencies
COSO
R I S K A P P E T I T E –C R I...
ISACA
Reporting Cybersecurity Risk to the Board of Directors
Freddy Dezeure
Reporting Cyber Risk to Boards
Joas A Santos
Red Team Operations Concepts
National Cyber Security Centrum
Ransomware Incident Response Plan The incident response cycle, applied to ransomware
CCN
Gestión deincidentes de ransomware INFORME DE BUENAS PRÁCTICAS
CSO.IE
Public Sector Cyber Security Baseline Standards
Mark Settle
Privacy By Design:From Principles toRequirements
Netpoleon India
DemystifyingPublic KeyInfrastructure (PKI)& CertificateLifecycle Management
PICUS
Red Report 2024 The Top 10 Most Prevalent MITRE ATT&CK® Techniques
National Security Agency
Implement Network Segmentation Encryption Cloud Envir by NSA
Active Directory Security Guide
O'Reilly
Practical Cloud Security
Incibe
CISO Libro Blanco
NACD
CISO handbook 2023
CREATED BY IBRAHIM S ALEH
CheatSheets of Common Attacks
AICPA
CGMA Cybersecurity Tool
CERT-EU
THREAT LANDSCAPE REPORT 2023
A Historical Journey Through Cybersecurity
IGNITE Technologies
A Detailed Guide for Pentester on Wfuzz
IGNITE Technologies
A Detailed Gidue on Command & Control (C2)
Ntirety
2024 Tech Predictions
Thecyphere
10 Steps to Cyber Security New Explained Cyphere
W W W . D E V S E C O P S G U I D E S . C O M
2FA Security Issues
Blue Team Notes
ENISA
BEST PRACTICES FOR CYBER CRISIS MANAGEMENT
BRIEF
Automated Threat Modeling with Threat Canvas
IGNITE Technologies
ANDROID PENTEST
IGNITE Technologies
Android Penetration Testing MOBSF FRAMEWORK
Active Directory
Active Directory PenTesting Tools
Sectrio
Vulnerability Assessment & Penetration Testing (VAPT)
IGNITE Technologies
Android Penetration Testing
Kaspersky
Incident Response Playbook: Dark Web Breaches
World Economic Forum
Cybersecurity Futures 2030
Interlinked Computingin 2040: Safety,Truth, Ownership, and Accountability
Agency for Digital Government
Cyber security in supplier relation ships
RED SIFT
State of Cyber Resilience 2023
ministry of security
DECODING CYBER ATTACKS
IGNITE Technologies
AUTOPSY LINUX AND WINDOWS
CheatSheets of Common Attacks
AICPA
CGMA Cybersecurity Tool
IGNITE Technologies
BURP SUITE FOR PENTESTER HACK BAR
Awesome Incident Response
Awesome Bug Bounty Tools
IGNITE Technologies
Android Penetration Testing
IGNITE Technologies
BURP SUITE for PENTESTER
Acronis
Acronis Cyber threats Report, H2 2023
IIRM
A Practical Guide to Enterprise Risk Management
IGNITE Technologies
Windows Privilege Escalation
HADESS
Moxa ioLogik E1212
HornetSecurity
MICROSOFT 365 SECURITY CHECKLIST
VIEH GROUP
METASPLOIT ESSENTIALS
IGNITE Technologies
Windows Privilege Escalation
Lock Your Doors
Kaspersky
Cybersecurity Alphabet
John the Ripper
John The Ripper A Pentester Guide
CYFIRMA
Caught in the Crossfire
DigiSPEAK
English Vocab for TECH
LUMU
DISRUPTING MSP CYBERSECURITY
IGNITE Technologies
DIGITAL FORENSICS – AN INTRODUCTION
SYNGRESS
THE BASICS OF WEB HACKING
NATIONAL PRIVACY COMMISSION
NPC PRIVACY TOOLKIT
Secure Claw
CYBER THREAT INTELLIGENCE ADVISORY REPORT
CRC Press
INTELLIGENT APPROACHES TO CYBER SECURITY
European Center for Digital Rights
GDPR: a culture of non-compliance?
cisco
Privacy as an Enabler of Customer Trust
National Cyber Security Centre
Prepare for Zero Trust
ENGINEERING THE DIGITAL TRANSFORMATION COMPANY
OT SECURITY
IGNITE Technologies
TRAINING PROGRAM
IGNITE Technologies
A DETAILED GUIDE ON HONEYPOTS
ACSC Australia
Identifying and Mitigating Living Off the Land Techniques
IGNITE Technologies
Nmap for Pentester PACKET TRACE
NACD - Internet Security Alliance
DIRECTOR’S HANDBOOK ON CYBER-RISK OVERSIGHT
IGNITE Technologies
MULTIPLE METHOD TO SETUP KALI LINUX
EC-council
THREAT REPORT 2024
sqreen
Pentest Best Practices Checklist
IGNITE Technologies
NMAP FOR PENTESTER
HADESS
NTLM Abuse Methods
IGNITE Technologies
NETCAT FOR PENTESTER COMPREHENSIVE GUIDE
FORESIGHT
Models for risk analysis and assessment
Interpol
METAVERSE
Microsoft Security
CISO Workshop
ICELAND.EXE
MALWARE ANALYSIS
Cyber People
The major cyberattacks on the telecommunications sector in 2023
ISECT
Information risk catalogue
OECD Publishing
Confidentiality and Information Security Management Toolkit
ThreatRadar
Threat Intel Roundup: Jenkins, ScarCruft, Midnight Blizzard
ThreatRadar
Threat Intel Roundup: Anydesk, FortiSIEM, Ivanti, Mastodon
Saudi Aramco
Third Party Cybersecurity Standard
txOne networks
The Crisis of Convergence: OT/ICS Cybersecurity in 2023
Kubernetes
The Hidden Dangers in Kubernetes Clusters
CISA
The Mirai Botnet Phenomenon
iexpeerts
10 Cybersecurity Advices
Login Soft
Annual Report – Vulnerability Intelligence
IoT Security Institute
The IoTSI SCCI Framework
FAIR
The Essential Guide to Secure Al
CISA
The Art of Balancing Cybersecurity and Business Growth
CISA
Banking Cybersecurity: Zero Margin For Error
IGNITE Technologies
WORDLISTS FOR PENTESTER
IGNITE Technologies
Wireless Penetration Testing PMKID Attack
IGNITE Technologies
Wireless Penetration Testing Wifite
IGNITE Technologies
Wireless Penetration Testing SSID Discovery
IGNITE Technologies
Wireless Penetration Testing BETTERCAP
Hyperproof
2023 Proposed Changesto NIST CSF
SentinelOne
WATCHTOWER Intelligence-Driven Threat Hunting
U.S. Department of Defense
Department of Defense (DoD) Cybersecurity Reference Architecture
CISA
Unmask Hidden Cyber Threats with MITRE ATT&CK
IGNITE Technologies
A DETAILED GUIDE TO NMAP SCAN WITH WIRESHARK
CISA
Underestimating GDPR & PCI-DSSImpact?
Didomi
What is the most important data privacy trend in 2024?
Carnegie Mellon University
Introduction to Threat Hunting
Insikt Group
Informe de Amenazas a la Infraestructura
Centre for Cyber Security Belgium
Cyber Secutiry Incident Management Guide
Natural Resources Canada
IACS Cyber Security Incident Response Playbook
HR Top Priorities for 2024
FDPIC - Federal Data Protection and Information Commissioner
Guide to Technical and Organisational Data Protection
The Institute of Internal auditors
Global Internal Audit Standards 2024
Foresiet
Global Cyber Security Trends
CEDPO
Generative AI The Data Protection Implications
Cybervergent
Cybervergent Cybersecurity Annual Report
Cybersecurity Career Roadmap
Center for Cyber Security
Cyber Security in Supplier Relationships Guide
IGNITE Technologies
TRAINING PROGRAM {CAPTURE THE FLAG}
IBCG
Code of Best Practices of Corporate Governance
CSA Cloud Security Alliance
Cloud & Compromise Gamifying of Cloud Security
Cybersecurity & Infrastructure Security Agency
CISA Roadmap for Artificial Intelligence
REMORA
Bridging the Gap in Defence Against Phishing
IGNITE Technologies
Automated Privilege Escalation
INE
ABC DE PROTECCION DE DATOS PERSONALES
IGNITE Technologies
A Detailed Guide on Medusa
IGNITE Technologies
A Detailed Guide on Crunch
IGNITE Technologies
A Detailed Guide on Cewl
Petr Chalupnik
A Deep Dive into Reconnaissance
EC-council
Threat Landscape 2024
Thecyphere
10 Steps to Secure Kubernetes by Harman Singh
CISA
vCISO: The Future of Cybersecurity
HADESS
Top 10 Web Hacking Techniques 2023
OPENHUNTING
THREAT HUNTING MALWARE INFRASTRUCTURE
IGNITE Technologies
RED TEAM OPERATIONS – MITRE ATTACK
National Cyber Security Centre
The Scourge of Ransomware
Australian Government
Overview of CyberSecurity Obligations for Corporate Leaders
HADESS
Memory analysis for fun and profit
Threat Research
Layers of Deception: Analyzing the Complex Stages of XLoader Malware Evolution
Personal Data
Introduction to Cybersecurity
MORE RESOURCES
CISO Strategics
cyber operations & soc
red - blue & purple teams
THREAT INTELLIGENCE
VULNERABILITIES
CYBER ATTACKS
DATA BREACH
MALLWARE
RANSOMWARE
DDOS ATTACKS
CLOUD SECURITY
IOT SECURITY
ot security
devsecops
hacking
risk & compliance
governance
data privacy
MORE CISO2CISO RESOURCES LIBRARY TO VIEW
CISO Strategics
SOC OPERATIONS
THREAT INTELLIGENCE
vulnerabilities
cyber attacks
RansoNWARE
DDOS ATTACKS
RED - BLUE & PURPLE
DATA BREACH
DATA PRIVACY
CLOUD SECURITY
IOT - OT SECURITY
RISK & COMPLIANCE
DEVSECOPS
Views: 0