Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
Pages: CISO2CISO Cyber Security Resources – CISO STRATEGIES
CISO STRATEGIES notepadS & resources
Marcos Jaimovich
FIRST.Org CVSS V4.0 Releasead – Navigation the Evolution – Dive into CVSS 4.0 Unveiled by...
Microsoft Security
Azure Defenses for Ransomware Attack by Microsoft Security
Akamai Guardicore
Risk Mitigation , Prevention and Cutting the Kill Chain – Minimize the impact of ransomware...
Marcos Jaimovich
Why do we compare a SOC (Security Operations Center) with the cockpit of a commercial...
World Economic Forum
The Global Risks Report 2023 – Insight Report – 18th Edition by World Economic Forum...
Orange Cyberdefense
Orange Cyberdefense Security Navigator 2023 – Research-driven insights to build a safer digital society
Forrester - Allie Mellen
Adapt Or Die: XDR Is On A Collision Course With SIEM And SOAR – EDR...
World Economic Forum
Advancing Cyber Resilience Principles and Tools for Boards by World Economic Forum (WEF)
BlackBerry CyberSecurity
Global Threat Intelligence Report – Delivering Actionable and Contextualized Intel to Increase Cyber Resilience by...
Federico Hansen
What is Cyber Resilience and Why Your Business Needs It by Federico Hansen ?
BlakerHostetler
2023 Data Security Incident Response Report – Seurity Measures & Approach by BlakerHostetler
Balbix
TOP 10 Cybersecurity Posture Metrics every CISO should use – A CISO Executive Guide by...
Perception Point
2023 Annual Report – Cybersecurity Trends & Insights by Perception Point
MANDIANT
MANDIANT – M-Trends 2023 – Mandiant Special Report
Microsoft Security
The Cost of Inaction – A CISOs guide for getting boards of directors to invest...
Fastercapital.com
How To Launch A Successful B2B Managed Security Services Provider MSSP Thinking like a CISO
Gartner Research
CISO Foundations – Cybersecurity Talent Strategies for CISOs by Gartner Research
Proofpoint
2023 Voice of the CISO – Global Insights into CISO challenges, expectactions and priorities report...
exabean
A CISOs Guide to Defender Alignment by exabean
Gartner
A CISOs Guide for Conversations with the CFO by Gartner
CRC Press
CISO Guidance Free Book by CRC Press
Apress
Zero Trust Security – An Enterprise Guide – Jason Garbis & Jerry Chapman – apress
Microsoft Security
Three Steps for Protecting Your Data End-to-End with Microsoft Purview by Microsoft Security
Akamai
Protecting Workloads in AWS with comprehensive Segmentation – Simpler, Faster Security by Akamai – Whitepaper
NCSC
Cyber Security Toolkit for Boards by NCSC – Resources designed to help board members govern...
Delinea
The Impact of Business Alignment on Cybersecurity Effectiveness – Global Survey of Cybersecurity Leaders by...
FEDERAL TRADE COMMISSION
Data Breach Response – A Guide for Business by Federal Trade Commission – business.ftc.gov
ACSC
2023 Information Security Manual by ACSC
Logan Simpson
3 questions your CEO has about Cybersecurity in simple terms by Logan Simpson
BlackBerry CyberSecurity
BlackBerry Cybersecurity Global Threat Intelligence Report April-2023 Edition
Marcos Jaimovich
Building a SECURE Minimum Viable Protection (SMVP) Product or Service. Software Quality must include Cybersecurity...
INCIBE & SPAIN GOVERNMENT
DIRECTOR MASTER PLAN OF SECURITY BY INCIBE & SPAIN GOVERNMENT. (translated version from the original...
DNSSENSE
Things of the Internet Global Cyber Domain Report by DNSSense – H2 – 2022 Report
ZERONORTH
Are Quality and Security Synonymous in Software by Zeronorth
Anish Roy
Quality Assurance for Software Development Must Include Cybersecurity – Why Cybersecurity and Software Quality Assurance...
WILEY
Phishing Dark Waters – The Offensive and Defensive Sides of Maliciosus Emails
KATY ANTON - JIM MANICO - JIM BIRD
OWASP PRO Active Controls for Developers v. 3 – Securing Coding Best Practices – 10...
David E. Sanger
The Perfect Weapon – WAR, SABOTAGE and FEAR in the Cyber Age by David E....
CSA Cloud Security Alliance
Security Implications of ChatGPT RC by Cloud Security Alliance – CSA
Rockwell
Cybersecurity Preparedness in Critical Infraestructure – Avoinding The Big Shutdown
cepal.org
Cybersecurity and the role of the Board of Directors in Latin America and the Caribbean...
CYLANCE
Introduction to Artificial Intelligence for Security Professionals free e-book by the Cylance Data Science Team...
MSSP ALERT
TOP 250 MSSPs 2022 edition by MSSP Alert – A CyberRisk Alliance Resource
Republica de Chile
Construyendo la Ciberseguridad en Chile
ACSC Australia
13 Questions for boards to ask about cyber security by Australian Cyber Security Centre –...
KPMG MEXICO & IPADE
Manual del Comite de Auditoria by KPMG Mexico & IPADE
CISA
Insider Threat Mitigation Guide by Cybersecurity Insfrastructure Security Agency
Shawn Powers & Michael Jablonski
The Real Cyber War – The Political Economy of Internet Freedom by Shawn Powers &...
iapp
2022 PRIVACY TECH VENDOR REPORT by IAPP
CISA
CISA STRATEGIC PLAN 2023-2025 by Cybersecurity & Insfrastructure Security Agency
ACSC Australia
Cyber Incident Response Plan Template by ACSC & Australian Goverment
UK Government
Detecting the Unknown – A Guide to Threat Hunting by UK Government
KROLL
Cyber Risk and CFOs – Over-Confidence is Costly – 2022 Edition by KROLL
Microsoft Security
Threat Hunting Survival Guide by Microsoft Security Experts
Tommy Babel
Executive Guide to Cyber Crisis Management 2023
CYFIRMA
ADVANCED SOCIAL ENGINEERING ATTACKS DECONSTRUCTED BY CFYRMA
MSSP ALERT
TOP 250 MSSPs Services Providers 2022 edition by MSSP Alert – A CyberRisk Alliance Resource...
McKinsey
Cybersecurity in a Digital Era by McKinsey. Digital McKinsey and Global Risk Practice.
Microsoft Security
Building a Holistic Insider Risk Management Program – 5 elements that help companies have stronger...
Cencys
2022 State of the internet report by cencys
ENISA-EUROPA
A Governance Framework for National Cybersecurity Strategies by European Union Agency for Cybersecurity – enisa
Harvard Business Review
Boards Are Having the Wrong Conversations About Cybersecurity – Board interactions with the CISO are...
BCG Global Cybersecurity Forum
Turning a Cybersecurity Strategy Into Reality A Holistic Performance Management Framework by BCG & STC
Arizona State University
THE FUTURE OF CYBER ENABLED FINANCIAL CRIME – New Crimes, New Criminals, and Economic Warfare...
Microsoft Security
Data Loss Prevention from on-premises to cloud by Microsoft Security
MANDIANT
THE DEFENDER´S ADVANTAGE – A GUIDE TO ACTIVATING CYBER DEFENSE BY MANDIANT
ICS2
A Resilient Cybersecurity Professionn Chart the Path Forward – ICS2 CYBERSECURITY WORKFORCE STUDY – A...
Argentina
Propuesta de Anteproyecto de Ley de Proteccion de Datos Personales – Ley 25326 – Agencia...
NIST
Artificial Intelligence Risk Management Framework – AI RMF 1.0 By NIST
ISACA
Reporting Cybersecurity Risk to the Board of Directors by ISACA
HARDVARD Kennedy School
National Cyber Power Index 2022 – HARDVARD Kennedy School – BELFER CENTER for Science and...
ISMS Forum & DPI
Guia Practica para la Gestion de Breachas de Datos Personas by ISMS and DPI
7 CEO CYBERSECURITY ACTIONS – START WORKING ON IT TODAY , DON´T WAIT !!!
CISA
Cybersecurity Incident & Vulnerability Response Playbooks by CISA
SCYTHE
Better Cybersecurity Metrics – SOC Metrics – Threat Hunting Metrics – Cyber Threat Intelligence (CTI)...
Dr. Erdal Ozkaya
Hiring a CISO – Super Guide for startups by Erdal Ozkaya
Ninjio´s
Ninjio´s Cyber Hygiene Checklist – Level Up Your Cybersecurity
ENISA
Identifying Emerging Cyber Security Threats and Challenges for 2030 by ENISA nad European Union Agency...
stottandmay.com
The CISO Survival Guide – Practical advice for Security Leaders by stottandmay.com
ECIIA
2023 RISK IN FOCUS – Hot topics for internal auditors by ECIIA – VUCA context...
hackercombat
10 Cyber Security Myths You Need To Stop Believing by HACKER COMBAT COMMUNITY
DRATA.COM
A Complete Guide to Cybersecurity Risk Management – Learn the ins and outs of risk...
Lawrence C. Miller
Data Leakage for Dummies by Lawrence C. Miller
CSC 2.0
2022 Annual Report on Implementation – CSC 2.0 by Jiwon Ma – Mark Montgomery
National Cyber Security
Cyber Security Toolkit for Boards – Helping board members to get to grips with cyber...
UFMCS ARMY
THE ARMY RED TEAM HANDBOOK – The Guide to Making Better Decisions version 9 by...
NACD - Intenet Security Alliance
Director´s Handbook on CYBER-RISK OVERSIGHT by NACD – Internet Security Alliance
Splunk
Five Automation Use Cases for Splunk SOAR by Splunk – Alert Enrichment , Phishing Investigation...
MITRE
11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTERS HIGHLIGHTS BY MITRE
CISA
Making a Business Case for Security – An Interagency Security Committee Best Practice by CISA...
Google Cybersecurity Action Team
Perspectives on Security for the Board by Cybersecurity Action Team – Google Cloud – April...
The Security Institute Fellow
DEFENCE-IN-DEPTH – Security Myths, Popular Pursuits, Reality & Concealed Vulnerabilities by The Security Institute Fellow
IT Governance
Cyber Security and Business Resilience – Thinking strategically by IT Governance
SecurityGen
Telecom Cybersecurity – 5G Protection Use Cases by SecurityGen
Marcos Jaimovich
Artificial intelligence was never a bad think – A self fulfilling Prophesy (My personal vision).
Deloitte
Communicating the value of cybersecurity to boards and leadership – Seven strategies for life sciences...
Tenable.cs Cloud Security
7 Habits of Highly Effective DEVSECOPS Teams whitepaper by Tenable.cs Cloud Security – DevSecOps is...
IST
MAPPING THE RANSOMWARE PAYMENT ECOSYSTEM BY ZOE BRAMMER – IST Institute of Security and Technology
CISO Forum
CISO’s – First 100 Days Roadmap – Your success as a security leader is determined...
Enterprise Strategy Group - ESG
Cybersecurity in the C-suite and Boardroom by Jon Oltsik – Enterprise Strategy Group (ESG)
European Commission
CYBER RESILIENCE ACT – New EU cybersecurity rules ensure more secure hardware and software products...
US Deparment of Defense
DevSecOps Fundamentals Guidebook – Tools & Activities by American Deparment of Defense
ANSSI & CCA France
Organising a Cyber Crisis Management Exercise – Positioning Cyber Resilience at the Highest Level by...
Hague Centre Strategic Stud
Cyber Arms Watch An Analysis of Stated & Perceived Offensive Cyber Capabilities by The Hague...
MVP - Minimun Viable Protection
The Importance of Risk Appetite in Risk Assessment – by MVP – Minimun Viable Protection
NSA
NSA CYBERSECURITY – YEAR IN REVIEW REPORT 2022. You must read IT !
CISA
Zero Trust Matutity Model by CISA
SALT
State of the CISO – a global report on priorities , pain points, and security...
Elevate Security
High Risk Users and Where to Fin Them by Elevate Security
Lester Chng
How to Define Objetives for Cybersecurity Tabletop Exercises by Lester Chng
Khoury-Avila-Brunelle-Mamadou
How Secure is Code Generated by ChatGPT ? by Khoury-Avila-Brunelle-Mamadou
GFCE
Introduction to Tabletop Exercises (TTX) – A practical Guidebook for Organizations by Capgemini for GFCE...
upstream
Global Automotive Cybersecurity Report 2022 – Automotive Cyber Threat Landscape in Light of New Regulations...
CISA
Shifting the Balance of Cybersecurity Risk – Principles and Approaches for Secure-by-Design – Secure-by-Default –...
MORE RESOURCES
CISO Strategics
cyber operations & soc
red - blue & purple teams
THREAT INTELLIGENCE
VULNERABILITIES
CYBER ATTACKS
DATA BREACH
MALLWARE
RANSOMWARE
DDOS ATTACKS
CLOUD SECURITY
IOT SECURITY
ot security
devsecops
hacking
risk & compliance
governance
data privacy
MORE CISO2CISO RESOURCES LIBRARY TO VIEW
CISO Strategics
SOC OPERATIONS
THREAT INTELLIGENCE
vulnerabilities
cyber attacks
RansoNWARE
DDOS ATTACKS
RED - BLUE & PURPLE
DATA BREACH
DATA PRIVACY
CLOUD SECURITY
IOT - OT SECURITY
RISK & COMPLIANCE
DEVSECOPS