The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Author: Constanza Rodriguez
Smart Cities & Critical Infrastructure Framework
The Internet of Things Security Institute is a Not for Profit academic and industry body dedicated to providing security frameworks and supporting educational services within an...
Sample Penetration Test Report
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Safeguarding Brain Data: Assessing the Privacy Practices of Consumer Neurotechnology Companies
For decades, scientists and healthcare professionals have employed neurotechnologies to understand the complexities of the human brain and pioneer cutting edge medical treatments. Neurotechnologies, which are...
Routing in FortiGate
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Risk and Privacy FREE BOOK
The importance of businesses being ‘operationally resilient’ is becoming increasingly important, and a driving force behind whether an organization can ensure that its valuable business operations...
Risk Framework Body Related Data (PD) Immersive Tech
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
CYBERSECURITY Improvements Needed in Addressing Risks to Operational Technology
The National Institute of Standards and Technology (NIST) describes OT as a broad range of programmable systems and devices that interact with the physical environment (or...
Remote ID Proofing Good Practices
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
RedTeam Tips Orchestrating Chaos Evading Defense Culture
Red Teaming involves simulating cyberattacks to test an organization’s defenses. Red Teams adopt the mindset of adversaries, aiming to uncover vulnerabilities and assess the effectiveness of...
Why Red TeamsPlay a Central Rolein Helping OrganizationsSecure AI Systems
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Red Report 2024 – The Top 10 Most Prevalent MITRE ATT&CK® Techniques The Rise of Hunter-Killer Malware
Marking its fourth year of publication, the Red Report 2024™ provides a critical dive into the evolving threat landscape, presenting a detailed analysis of adversaries’ most...
Threat Detection Report 2024
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Recommended Skills for a Cyber Security Career
Year after year, the cyber talent gap is increasing — currently estimated to have 3,5 million open positions worldwide — presenting all sorts of headaches for...
Ransomware Cartography (2014-2024)
Ransomware is a type of malicious software designed to block access to a computer system or data until a ransom is paid. Over the past decade,...
Pwning the Domain Persistence
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Purple Concepts Bridging the Gap
Whether your focus area is Red Team, Blue Team, Cyber Threat Intelligence, Detection and Response, or any other facet of security, organizations need trained professionals who...
PROTECTIVE SECURITYPOLICY FRAMEWORKSecuring government business:Protective security guidance for executive
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Política Nacional de Ciberseguridad 2023-2028
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Phishing Attack Pentesting Guide
Phishing is probably one of the biggest issues for most organizations today, with network and endpoint defensive technology getting better and better, the bad guys aren’t...
Perspectiveson Securityfor the Board
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
OSINT Method for Map Investigations
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Practical Examples ofSecurity Risk Assessmentfor Industrial Control Systems
“Security Risk Assessment Guide for Industrial Control Systems (ICS)” (hereinafter, the “Guide”) focuses primarily on developing a correct understanding of security risk analysis, and explaining methodologies,...
Office 365 Secure Confirmation Framework
The National Cyber Security Centre (NCSC), in coordination with Microsoft and Ekco, have developed this Secure Configuration Framework for Office 365 a component of the Microsoft...
Observatorio Riesgos Ciberseguridad 2024
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Bloking Malware Through Antivirus Security Profile in FortiGate
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Generative AI for Organizational Use:Internal Policy Checklist
As the use of generative AI increases, organizations are revisiting their internal policies and procedures to ensure responsible, legal, and ethical employee use of these novel...
Best Practices for Cyber Crisis Management
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
A Guide to Defining Reasonable Cybersecurity
In the United States, there is no national, statutory, cross-sector minimum standard for information security. No national law defineswhat would be considered reasonable security in matters...
AWS Cloud Security Checklist
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...