Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
Pages: CISO2CISO Cyber Security Resources – CISO STRATEGIES
CISO STRATEGIES notepadS & resources
Marcos Jaimovich
FIRST.Org CVSS V4.0 Releasead – Navigation the Evolution – Dive into CVSS 4.0 Unveiled by...
Microsoft Security
Azure Defenses for Ransomware Attack by Microsoft Security
Akamai Guardicore
Risk Mitigation , Prevention and Cutting the Kill Chain – Minimize the impact of ransomware...
Marcos Jaimovich
Why do we compare a SOC (Security Operations Center) with the cockpit of a commercial...
World Economic Forum
The Global Risks Report 2023 – Insight Report – 18th Edition by World Economic Forum...
Orange Cyberdefense
Orange Cyberdefense Security Navigator 2023 – Research-driven insights to build a safer digital society
Forrester - Allie Mellen
Adapt Or Die: XDR Is On A Collision Course With SIEM And SOAR – EDR...
World Economic Forum
Advancing Cyber Resilience Principles and Tools for Boards by World Economic Forum (WEF)
BlackBerry CyberSecurity
Global Threat Intelligence Report – Delivering Actionable and Contextualized Intel to Increase Cyber Resilience by...
Federico Hansen
What is Cyber Resilience and Why Your Business Needs It by Federico Hansen ?
BlakerHostetler
2023 Data Security Incident Response Report – Seurity Measures & Approach by BlakerHostetler
Balbix
TOP 10 Cybersecurity Posture Metrics every CISO should use – A CISO Executive Guide by...
Perception Point
2023 Annual Report – Cybersecurity Trends & Insights by Perception Point
MANDIANT
MANDIANT – M-Trends 2023 – Mandiant Special Report
Microsoft Security
The Cost of Inaction – A CISOs guide for getting boards of directors to invest...
Fastercapital.com
How To Launch A Successful B2B Managed Security Services Provider MSSP Thinking like a CISO
Gartner Research
CISO Foundations – Cybersecurity Talent Strategies for CISOs by Gartner Research
Proofpoint
2023 Voice of the CISO – Global Insights into CISO challenges, expectactions and priorities report...
exabean
A CISOs Guide to Defender Alignment by exabean
Gartner
A CISOs Guide for Conversations with the CFO by Gartner
CRC Press
CISO Guidance Free Book by CRC Press
Apress
Zero Trust Security – An Enterprise Guide – Jason Garbis & Jerry Chapman – apress
Microsoft Security
Three Steps for Protecting Your Data End-to-End with Microsoft Purview by Microsoft Security
Akamai
Protecting Workloads in AWS with comprehensive Segmentation – Simpler, Faster Security by Akamai – Whitepaper
NCSC
Cyber Security Toolkit for Boards by NCSC – Resources designed to help board members govern...
Delinea
The Impact of Business Alignment on Cybersecurity Effectiveness – Global Survey of Cybersecurity Leaders by...
FEDERAL TRADE COMMISSION
Data Breach Response – A Guide for Business by Federal Trade Commission – business.ftc.gov
ACSC
2023 Information Security Manual by ACSC
Logan Simpson
3 questions your CEO has about Cybersecurity in simple terms by Logan Simpson
BlackBerry CyberSecurity
BlackBerry Cybersecurity Global Threat Intelligence Report April-2023 Edition
Marcos Jaimovich
Building a SECURE Minimum Viable Protection (SMVP) Product or Service. Software Quality must include Cybersecurity...
INCIBE & SPAIN GOVERNMENT
DIRECTOR MASTER PLAN OF SECURITY BY INCIBE & SPAIN GOVERNMENT. (translated version from the original...
DNSSENSE
Things of the Internet Global Cyber Domain Report by DNSSense – H2 – 2022 Report
WILEY
Phishing Dark Waters – The Offensive and Defensive Sides of Maliciosus Emails
Anish Roy
Quality Assurance for Software Development Must Include Cybersecurity – Why Cybersecurity and Software Quality Assurance...
ZERONORTH
Are Quality and Security Synonymous in Software by Zeronorth
KATY ANTON - JIM MANICO - JIM BIRD
OWASP PRO Active Controls for Developers v. 3 – Securing Coding Best Practices – 10...
David E. Sanger
The Perfect Weapon – WAR, SABOTAGE and FEAR in the Cyber Age by David E....
CSA Cloud Security Alliance
Security Implications of ChatGPT RC by Cloud Security Alliance – CSA
Rockwell
Cybersecurity Preparedness in Critical Infraestructure – Avoinding The Big Shutdown
cepal.org
Cybersecurity and the role of the Board of Directors in Latin America and the Caribbean...
CYLANCE
Introduction to Artificial Intelligence for Security Professionals free e-book by the Cylance Data Science Team...
MSSP ALERT
TOP 250 MSSPs 2022 edition by MSSP Alert – A CyberRisk Alliance Resource
Republica de Chile
Construyendo la Ciberseguridad en Chile
Shawn Powers & Michael Jablonski
The Real Cyber War – The Political Economy of Internet Freedom by Shawn Powers &...
Lawrence C. Miller
Data Leakage for Dummies by Lawrence C. Miller
Argentina
Propuesta de Anteproyecto de Ley de Proteccion de Datos Personales – Ley 25326 – Agencia...
ACSC Australia
13 Questions for boards to ask about cyber security by Australian Cyber Security Centre –...
European Commission
CYBER RESILIENCE ACT – New EU cybersecurity rules ensure more secure hardware and software products...
iapp
2022 PRIVACY TECH VENDOR REPORT by IAPP
ENISA-EUROPA
A Governance Framework for National Cybersecurity Strategies by European Union Agency for Cybersecurity – enisa
Enterprise Strategy Group - ESG
Cybersecurity in the C-suite and Boardroom by Jon Oltsik – Enterprise Strategy Group (ESG)
Tenable.cs Cloud Security
7 Habits of Highly Effective DEVSECOPS Teams whitepaper by Tenable.cs Cloud Security – DevSecOps is...
ANSSI & CCA France
Organising a Cyber Crisis Management Exercise – Positioning Cyber Resilience at the Highest Level by...
Microsoft Security
Data Loss Prevention from on-premises to cloud by Microsoft Security
Cencys
2022 State of the internet report by cencys
CISO Forum
CISO’s – First 100 Days Roadmap – Your success as a security leader is determined...
NIST
Artificial Intelligence Risk Management Framework – AI RMF 1.0 By NIST
CISA
Zero Trust Matutity Model by CISA
Argentina
Propuesta de Anteproyecto de Ley de Proteccion de Datos Personales – Ley 25326 – Agencia...
ACSC Australia
13 Questions for boards to ask about cyber security by Australian Cyber Security Centre –...
7 CEO CYBERSECURITY ACTIONS – START WORKING ON IT TODAY , DON´T WAIT !!!
Shawn Powers & Michael Jablonski
The Real Cyber War – The Political Economy of Internet Freedom by Shawn Powers &...
Lawrence C. Miller
Data Leakage for Dummies by Lawrence C. Miller
ISMS Forum & DPI
Guia Practica para la Gestion de Breachas de Datos Personas by ISMS and DPI
Hague Centre Strategic Stud
Cyber Arms Watch An Analysis of Stated & Perceived Offensive Cyber Capabilities by The Hague...
Ninjio´s
Ninjio´s Cyber Hygiene Checklist – Level Up Your Cybersecurity
Dr. Erdal Ozkaya
Hiring a CISO – Super Guide for startups by Erdal Ozkaya
National Cyber Security
Cyber Security Toolkit for Boards – Helping board members to get to grips with cyber...
hackercombat
10 Cyber Security Myths You Need To Stop Believing by HACKER COMBAT COMMUNITY
ECIIA
2023 RISK IN FOCUS – Hot topics for internal auditors by ECIIA – VUCA context...
MITRE
11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTERS HIGHLIGHTS BY MITRE
CISA
CISA STRATEGIC PLAN 2023-2025 by Cybersecurity & Insfrastructure Security Agency
Microsoft Security
Building a Holistic Insider Risk Management Program – 5 elements that help companies have stronger...
Microsoft Security
Threat Hunting Survival Guide by Microsoft Security Experts
Google Cybersecurity Action Team
Perspectives on Security for the Board by Cybersecurity Action Team – Google Cloud – April...
Harvard Business Review
Boards Are Having the Wrong Conversations About Cybersecurity – Board interactions with the CISO are...
KROLL
Cyber Risk and CFOs – Over-Confidence is Costly – 2022 Edition by KROLL
UK Government
Detecting the Unknown – A Guide to Threat Hunting by UK Government
McKinsey
Cybersecurity in a Digital Era by McKinsey. Digital McKinsey and Global Risk Practice.
Deloitte
Communicating the value of cybersecurity to boards and leadership – Seven strategies for life sciences...
MSSP ALERT
TOP 250 MSSPs Services Providers 2022 edition by MSSP Alert – A CyberRisk Alliance Resource...
iapp
2022 PRIVACY TECH VENDOR REPORT by IAPP
ENISA-EUROPA
A Governance Framework for National Cybersecurity Strategies by European Union Agency for Cybersecurity – enisa
Enterprise Strategy Group - ESG
Cybersecurity in the C-suite and Boardroom by Jon Oltsik – Enterprise Strategy Group (ESG)
European Commission
CYBER RESILIENCE ACT – New EU cybersecurity rules ensure more secure hardware and software products...
ANSSI & CCA France
Organising a Cyber Crisis Management Exercise – Positioning Cyber Resilience at the Highest Level by...
Microsoft Security
Data Loss Prevention from on-premises to cloud by Microsoft Security
Tenable.cs Cloud Security
7 Habits of Highly Effective DEVSECOPS Teams whitepaper by Tenable.cs Cloud Security – DevSecOps is...
CISO Forum
CISO’s – First 100 Days Roadmap – Your success as a security leader is determined...
NIST
Artificial Intelligence Risk Management Framework – AI RMF 1.0 By NIST
CISA
Zero Trust Matutity Model by CISA
Cencys
2022 State of the internet report by cencys
ACSC Australia
13 Questions for boards to ask about cyber security by Australian Cyber Security Centre –...
7 CEO CYBERSECURITY ACTIONS – START WORKING ON IT TODAY , DON´T WAIT !!!
Shawn Powers & Michael Jablonski
The Real Cyber War – The Political Economy of Internet Freedom by Shawn Powers &...
CSC 2.0
2022 Annual Report on Implementation – CSC 2.0 by Jiwon Ma – Mark Montgomery
MANDIANT
THE DEFENDER´S ADVANTAGE – A GUIDE TO ACTIVATING CYBER DEFENSE BY MANDIANT
Marcos Jaimovich
Artificial intelligence was never a bad think – A self fulfilling Prophesy (My personal vision).
stottandmay.com
The CISO Survival Guide – Practical advice for Security Leaders by stottandmay.com
Arizona State University
THE FUTURE OF CYBER ENABLED FINANCIAL CRIME – New Crimes, New Criminals, and Economic Warfare...
IST
MAPPING THE RANSOMWARE PAYMENT ECOSYSTEM BY ZOE BRAMMER – IST Institute of Security and Technology
ISACA
Reporting Cybersecurity Risk to the Board of Directors by ISACA
IT Governance
Cyber Security and Business Resilience – Thinking strategically by IT Governance
HARDVARD Kennedy School
National Cyber Power Index 2022 – HARDVARD Kennedy School – BELFER CENTER for Science and...
US Deparment of Defense
DevSecOps Fundamentals Guidebook – Tools & Activities by American Deparment of Defense
CISA
Cybersecurity Incident & Vulnerability Response Playbooks by CISA
SALT
State of the CISO – a global report on priorities , pain points, and security...
Elevate Security
High Risk Users and Where to Fin Them by Elevate Security
Lester Chng
How to Define Objetives for Cybersecurity Tabletop Exercises by Lester Chng
Khoury-Avila-Brunelle-Mamadou
How Secure is Code Generated by ChatGPT ? by Khoury-Avila-Brunelle-Mamadou
GFCE
Introduction to Tabletop Exercises (TTX) – A practical Guidebook for Organizations by Capgemini for GFCE...
upstream
Global Automotive Cybersecurity Report 2022 – Automotive Cyber Threat Landscape in Light of New Regulations...
CISA
Shifting the Balance of Cybersecurity Risk – Principles and Approaches for Secure-by-Design – Secure-by-Default –...
MORE RESOURCES
CISO Strategics
cyber operations & soc
red - blue & purple teams
THREAT INTELLIGENCE
VULNERABILITIES
CYBER ATTACKS
DATA BREACH
MALLWARE
RANSOMWARE
DDOS ATTACKS
CLOUD SECURITY
IOT SECURITY
ot security
devsecops
hacking
risk & compliance
governance
data privacy
MORE CISO2CISO RESOURCES LIBRARY TO VIEW
CISO Strategics
SOC OPERATIONS
THREAT INTELLIGENCE
vulnerabilities
cyber attacks
RansoNWARE
DDOS ATTACKS
RED - BLUE & PURPLE
DATA BREACH
DATA PRIVACY
CLOUD SECURITY
IOT - OT SECURITY
RISK & COMPLIANCE
DEVSECOPS
Views: 0