The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Author: Lucas Coletta
CYBER SECURITY IN ESTONIA 2024
In 2023, Estonia experienced an increase in cyberattacks due to geopolitical tensions, particularly stemming from the conflict between Russia and Ukraine. Estonia was also affected by...
Cyber security guide for SMEs
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Public Sector Cyber Security Baseline Standards
November 2021 The National Cyber Security Strategy 2019-2024 states that the National Cyber Security Centre (NCSC), in conjunction with the OGCIO, will under Measure 8 formulate...
Advanced Digital Auditing
Complex technology has been around ever since the start of computers. Maxwell Newman’s first programmable computer Colossus in 1943 cracking World War II cryptography was a...
Adaptive DLL Hijacking
Dynamic-Link Library (DLL) hijacking has been a focal technique for adversarial operations over the years, evolving from a simple exploitation method into a sophisticated and adaptive...
Cyber Resilience Act Requirements Standards Mapping
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
A ROADMAP FOR AI GOVERNANCE
Lessons from G20 National Strategies THE RAPID EVOLUTION OF artificial intelligence (AI) is poised to create societal transformations. Indeed, AI is already emerging as a factor...
A Little Guide to SMB Enumeration
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Adaptacióna PCI DSS 4.0
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
A Guide to User and Entity Behavior Analytics (UEBA)
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
A Guide to Penetration Testing
The document titled “A Guide to Penetration Testing” is a comprehensive guide published by CREST in December 2022. It provides in-depth advice on establishing and managing...
100 Offensive Linux Security Tools
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
100-Question Cybersecurity checklist for small businesses
The document emphasizes the critical importance of cybersecurity for small businesses, highlighting that protecting data and systems is essential for business continuity. It outlines a comprehensive...
90 DAYS A CISO’S JOURNEY TO IMPACT
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
64 METHODS FOR MIMIKATZ EXECUTION
The document appears to focus on tools and techniques used in red teaming, specifically highlighting the use of Mimikatz and Invoke-Obfuscation. Overall, the document serves as...
Ciberseguridad: Prioridad Estratégica para los CEO.
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Cybersecurity Threats Challenges Opportunities
As technology continues to evolve so also do the opportunities and challenges it provides. We are at a crossroads as we move from a society already...
Strategic Cybersecurity Talent Framework
In today’s hyperconnected digital landscape, the cybersecurity industry faces a critical global shortage of nearly 4 million professionals. With a consistent year-on-year increase in demand for...
CYBERSECURITY PLAYBOOK
The “Open Source Cybersecurity Playbook” is a comprehensive guide designed to enhance organizational security against various cyber threats. It is divided into three main parts: Part...
CYBER SECURITY INCIDENT MANAGEMENT GUIDE
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Cybersecurity Frameworks Comparison
NIST CSF vs ISO 27001/2 vs NIST 800-171 vs NIST 800-53 vs SCF The Secure Controls Framework (SCF) is designed to provide a comprehensive catalog of...
Cybersecurity for Distributed Wind
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Cybersecurity – DORA Practical Guide
The Digital Operational Resilience Act (DORA) is set to come into effect on January 17, 2025, aiming to enhance the operational resilience of financial entities, including...
Cybersecurity Compliance Guide
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
EVENT CODES for fun & profit
The document provides an extensive list of Windows event codes related to cybersecurity, focusing on attack techniques and defense strategies. The main topics and core ideas...
Top 300 Azure Sentinel Used Cases KQL (Kusto Query Language) queries
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Top100 Cyber Threats
Introduction & Solution The document “Top 100 Cyber Threats Introduction & Solution” from Travarsa.com provides an overview of the main cyber threats and offers solutions to...
Threat Landscape Update Report
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Threat Intel Roundup
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...





























