WEAPONIZING PLCS Programmable logic controllers (PLCs) are indispensable industrial devices that control manufacturing processes in every critical infrastructure sector. Because of their position within automation, threat...
Author: Lucas Coletta
EUROPEAN CYBERSECURITY SKILLS FRAMEWORK (ECSF)
The European Cybersecurity Skills Framework (ECSF) aims to establish a comprehensive structure for defining roles, responsibilities, and competencies in the field of cybersecurity. It provides a...
EU AI Act – EU 2024/1689
Controls Checklist Mapping compliance requirements to controls is a lengthy and time-consuming task. This document presents a Proof of Concept (PoC) exploring the potential of Artificial...
Enterprise Information Security
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
REMOTE IDPROOFING GOOD PRACTICES
The purpose of this study is to build upon previous ENISA studies on RIDP and focus on new developments, security recommendations and good practices, when RIDP...
ENCRYPTION,HASHING AND DIGITAL SIGNATURE
Encryption is the process of converting plaintext or data into a ciphertext using an algorithm and a key. This process makes the original data unreadable to...
ENCRYPTED REVERSE
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Email Phishing Playbook
The document outlines a structured approach to addressing phishing threats that jeopardize organizational security and increase the risk of data breaches. Views: 16
El estado de la seguridad informática en Alemania en 2023
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
General Data Protection Regulation (GDPR) Guide
This guide summarises key aspects of the GDPR and highlights the most important actions which organisations should take in seeking to comply with it. We have...
GDPR & Generative AI
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
GDPR for Third-party Risk Management
Europe’s GDPR is widely-discussed in today’s news cycles and for good reason. The regulation impacts many organizations throughout the world, and violations of the regulation can...
GDPR IN PRACTICE
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Navigating Cyber
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Fraud risk management
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Fletchen Stealer
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
FILE TRANSFER CHEAT SHEET
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
How to Manage Cyber Incidents?
Covers four examples cover containment, analysis, remediation, review and lessons learned The document “Examples on Managing Cyber Incidents” from Cyphere outlines several key strategies and real-world...
CYBER CRISIS INVESTIGATION AND MANAGEMENT
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Guidelines for secure AI system development
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
A Complete Guide to Data Breaches
In 2022, the average cost of a data breach reached a record high of US$4.35 million , and in 2023, that figure is expected to rise...
Ciberseguridad en Smart Toys
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Defensa de endpoints en sistemas de control industrial
Desde hace varios años se habla de la Industria 4.0 y la digitalización de los procesos industriales. Esta evolución ha hecho que los dispositivos encargados de...
Global Threat Intelligence Report
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
A new payments paradigm
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Global Cybersecurity Capacity Program
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
GLOBAL CYBER THREAT REPORT
ThreatMon’s 2024 Mid-Year Global Cyber Threat Report explores the global threat landscape to give you a comprehensive overview of the most significant cyber threats and trends...
Getting started withsecurity metrics
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Gestión de Riesgos de Ciberseguridad
The document titled “Gestión de Riesgos de Ciberseguridad” provides an in-depth exploration of cybersecurity risk management principles, frameworks, and best practices. Below is a detailed summary...