Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
Pages: CISO2CISO Cyber Security Resources – CISO STRATEGIES
CISO STRATEGIES notepadS & resources
Marcos Jaimovich
FIRST.Org CVSS V4.0 Releasead – Navigation the Evolution – Dive into CVSS 4.0 Unveiled by...
Microsoft Security
Azure Defenses for Ransomware Attack by Microsoft Security
Akamai Guardicore
Risk Mitigation , Prevention and Cutting the Kill Chain – Minimize the impact of ransomware...
Marcos Jaimovich
Why do we compare a SOC (Security Operations Center) with the cockpit of a commercial...
World Economic Forum
The Global Risks Report 2023 – Insight Report – 18th Edition by World Economic Forum...
Orange Cyberdefense
Orange Cyberdefense Security Navigator 2023 – Research-driven insights to build a safer digital society
Forrester - Allie Mellen
Adapt Or Die: XDR Is On A Collision Course With SIEM And SOAR – EDR...
World Economic Forum
Advancing Cyber Resilience Principles and Tools for Boards by World Economic Forum (WEF)
BlackBerry CyberSecurity
Global Threat Intelligence Report – Delivering Actionable and Contextualized Intel to Increase Cyber Resilience by...
Federico Hansen
What is Cyber Resilience and Why Your Business Needs It by Federico Hansen ?
BlakerHostetler
2023 Data Security Incident Response Report – Seurity Measures & Approach by BlakerHostetler
Balbix
TOP 10 Cybersecurity Posture Metrics every CISO should use – A CISO Executive Guide by...
Perception Point
2023 Annual Report – Cybersecurity Trends & Insights by Perception Point
MANDIANT
MANDIANT – M-Trends 2023 – Mandiant Special Report
Microsoft Security
The Cost of Inaction – A CISOs guide for getting boards of directors to invest...
Fastercapital.com
How To Launch A Successful B2B Managed Security Services Provider MSSP Thinking like a CISO
Gartner Research
CISO Foundations – Cybersecurity Talent Strategies for CISOs by Gartner Research
Proofpoint
2023 Voice of the CISO – Global Insights into CISO challenges, expectactions and priorities report...
exabean
A CISOs Guide to Defender Alignment by exabean
Gartner
A CISOs Guide for Conversations with the CFO by Gartner
CRC Press
CISO Guidance Free Book by CRC Press
Apress
Zero Trust Security – An Enterprise Guide – Jason Garbis & Jerry Chapman – apress
Microsoft Security
Three Steps for Protecting Your Data End-to-End with Microsoft Purview by Microsoft Security
Akamai
Protecting Workloads in AWS with comprehensive Segmentation – Simpler, Faster Security by Akamai – Whitepaper
NCSC
Cyber Security Toolkit for Boards by NCSC – Resources designed to help board members govern...
Delinea
The Impact of Business Alignment on Cybersecurity Effectiveness – Global Survey of Cybersecurity Leaders by...
FEDERAL TRADE COMMISSION
Data Breach Response – A Guide for Business by Federal Trade Commission – business.ftc.gov
ACSC
2023 Information Security Manual by ACSC
Logan Simpson
3 questions your CEO has about Cybersecurity in simple terms by Logan Simpson
BlackBerry CyberSecurity
BlackBerry Cybersecurity Global Threat Intelligence Report April-2023 Edition
Marcos Jaimovich
Building a SECURE Minimum Viable Protection (SMVP) Product or Service. Software Quality must include Cybersecurity...
INCIBE & SPAIN GOVERNMENT
DIRECTOR MASTER PLAN OF SECURITY BY INCIBE & SPAIN GOVERNMENT. (translated version from the original...
DNSSENSE
Things of the Internet Global Cyber Domain Report by DNSSense – H2 – 2022 Report
Anish Roy
Quality Assurance for Software Development Must Include Cybersecurity – Why Cybersecurity and Software Quality Assurance...
ZERONORTH
Are Quality and Security Synonymous in Software by Zeronorth
WILEY
Phishing Dark Waters – The Offensive and Defensive Sides of Maliciosus Emails
KATY ANTON - JIM MANICO - JIM BIRD
OWASP PRO Active Controls for Developers v. 3 – Securing Coding Best Practices – 10...
David E. Sanger
The Perfect Weapon – WAR, SABOTAGE and FEAR in the Cyber Age by David E....
CSA Cloud Security Alliance
Security Implications of ChatGPT RC by Cloud Security Alliance – CSA
Rockwell
Cybersecurity Preparedness in Critical Infraestructure – Avoinding The Big Shutdown
cepal.org
Cybersecurity and the role of the Board of Directors in Latin America and the Caribbean...
CYLANCE
Introduction to Artificial Intelligence for Security Professionals free e-book by the Cylance Data Science Team...
MSSP ALERT
TOP 250 MSSPs 2022 edition by MSSP Alert – A CyberRisk Alliance Resource
Republica de Chile
Construyendo la Ciberseguridad en Chile
MVP - Minimun Viable Protection
The Importance of Risk Appetite in Risk Assessment – by MVP – Minimun Viable Protection
ICS2
A Resilient Cybersecurity Professionn Chart the Path Forward – ICS2 CYBERSECURITY WORKFORCE STUDY – A...
NSA
NSA CYBERSECURITY – YEAR IN REVIEW REPORT 2022. You must read IT !
ENISA
Identifying Emerging Cyber Security Threats and Challenges for 2030 by ENISA nad European Union Agency...
CSC 2.0
2022 Annual Report on Implementation – CSC 2.0 by Jiwon Ma – Mark Montgomery
MANDIANT
THE DEFENDER´S ADVANTAGE – A GUIDE TO ACTIVATING CYBER DEFENSE BY MANDIANT
Marcos Jaimovich
Artificial intelligence was never a bad think – A self fulfilling Prophesy (My personal vision).
stottandmay.com
The CISO Survival Guide – Practical advice for Security Leaders by stottandmay.com
Arizona State University
THE FUTURE OF CYBER ENABLED FINANCIAL CRIME – New Crimes, New Criminals, and Economic Warfare...
IST
MAPPING THE RANSOMWARE PAYMENT ECOSYSTEM BY ZOE BRAMMER – IST Institute of Security and Technology
ISACA
Reporting Cybersecurity Risk to the Board of Directors by ISACA
IT Governance
Cyber Security and Business Resilience – Thinking strategically by IT Governance
HARDVARD Kennedy School
National Cyber Power Index 2022 – HARDVARD Kennedy School – BELFER CENTER for Science and...
US Deparment of Defense
DevSecOps Fundamentals Guidebook – Tools & Activities by American Deparment of Defense
CISA
Cybersecurity Incident & Vulnerability Response Playbooks by CISA
SALT
State of the CISO – a global report on priorities , pain points, and security...
MVP - Minimun Viable Protection
The Importance of Risk Appetite in Risk Assessment – by MVP – Minimun Viable Protection
ICS2
A Resilient Cybersecurity Professionn Chart the Path Forward – ICS2 CYBERSECURITY WORKFORCE STUDY – A...
NSA
NSA CYBERSECURITY – YEAR IN REVIEW REPORT 2022. You must read IT !
ENISA
Identifying Emerging Cyber Security Threats and Challenges for 2030 by ENISA nad European Union Agency...
KPMG MEXICO & IPADE
Manual del Comite de Auditoria by KPMG Mexico & IPADE
BCG Global Cybersecurity Forum
Turning a Cybersecurity Strategy Into Reality A Holistic Performance Management Framework by BCG & STC
CISA
Insider Threat Mitigation Guide by Cybersecurity Insfrastructure Security Agency
DRATA.COM
A Complete Guide to Cybersecurity Risk Management – Learn the ins and outs of risk...
Tommy Babel
Executive Guide to Cyber Crisis Management 2023
CISA
CISA STRATEGIC PLAN 2023-2025 by Cybersecurity & Insfrastructure Security Agency
CYFIRMA
ADVANCED SOCIAL ENGINEERING ATTACKS DECONSTRUCTED BY CFYRMA
ACSC Australia
Cyber Incident Response Plan Template by ACSC & Australian Goverment
US Deparment of Defense
DevSecOps Fundamentals Guidebook – Tools & Activities by American Deparment of Defense
CISA
Cybersecurity Incident & Vulnerability Response Playbooks by CISA
SALT
State of the CISO – a global report on priorities , pain points, and security...
MVP - Minimun Viable Protection
The Importance of Risk Appetite in Risk Assessment – by MVP – Minimun Viable Protection
ICS2
A Resilient Cybersecurity Professionn Chart the Path Forward – ICS2 CYBERSECURITY WORKFORCE STUDY – A...
NSA
NSA CYBERSECURITY – YEAR IN REVIEW REPORT 2022. You must read IT !
ENISA
Identifying Emerging Cyber Security Threats and Challenges for 2030 by ENISA nad European Union Agency...
KPMG MEXICO & IPADE
Manual del Comite de Auditoria by KPMG Mexico & IPADE
BCG Global Cybersecurity Forum
Turning a Cybersecurity Strategy Into Reality A Holistic Performance Management Framework by BCG & STC
CISA
Insider Threat Mitigation Guide by Cybersecurity Insfrastructure Security Agency
DRATA.COM
A Complete Guide to Cybersecurity Risk Management – Learn the ins and outs of risk...
Tommy Babel
Executive Guide to Cyber Crisis Management 2023
CISA
CISA STRATEGIC PLAN 2023-2025 by Cybersecurity & Insfrastructure Security Agency
CYFIRMA
ADVANCED SOCIAL ENGINEERING ATTACKS DECONSTRUCTED BY CFYRMA
ACSC Australia
Cyber Incident Response Plan Template by ACSC & Australian Goverment
NACD - Intenet Security Alliance
Director´s Handbook on CYBER-RISK OVERSIGHT by NACD – Internet Security Alliance
KROLL
Cyber Risk and CFOs – Over-Confidence is Costly – 2022 Edition by KROLL
Microsoft Security
Building a Holistic Insider Risk Management Program – 5 elements that help companies have stronger...
Microsoft Security
Threat Hunting Survival Guide by Microsoft Security Experts
Google Cybersecurity Action Team
Perspectives on Security for the Board by Cybersecurity Action Team – Google Cloud – April...
Harvard Business Review
Boards Are Having the Wrong Conversations About Cybersecurity – Board interactions with the CISO are...
MSSP ALERT
TOP 250 MSSPs Services Providers 2022 edition by MSSP Alert – A CyberRisk Alliance Resource...
UK Government
Detecting the Unknown – A Guide to Threat Hunting by UK Government
McKinsey
Cybersecurity in a Digital Era by McKinsey. Digital McKinsey and Global Risk Practice.
CSC 2.0
2022 Annual Report on Implementation – CSC 2.0 by Jiwon Ma – Mark Montgomery
MANDIANT
THE DEFENDER´S ADVANTAGE – A GUIDE TO ACTIVATING CYBER DEFENSE BY MANDIANT
Marcos Jaimovich
Artificial intelligence was never a bad think – A self fulfilling Prophesy (My personal vision).
stottandmay.com
The CISO Survival Guide – Practical advice for Security Leaders by stottandmay.com
Arizona State University
THE FUTURE OF CYBER ENABLED FINANCIAL CRIME – New Crimes, New Criminals, and Economic Warfare...
IST
MAPPING THE RANSOMWARE PAYMENT ECOSYSTEM BY ZOE BRAMMER – IST Institute of Security and Technology
ISACA
Reporting Cybersecurity Risk to the Board of Directors by ISACA
IT Governance
Cyber Security and Business Resilience – Thinking strategically by IT Governance
HARDVARD Kennedy School
National Cyber Power Index 2022 – HARDVARD Kennedy School – BELFER CENTER for Science and...
US Deparment of Defense
DevSecOps Fundamentals Guidebook – Tools & Activities by American Deparment of Defense
CISA
Cybersecurity Incident & Vulnerability Response Playbooks by CISA
SALT
State of the CISO – a global report on priorities , pain points, and security...
Elevate Security
High Risk Users and Where to Fin Them by Elevate Security
Lester Chng
How to Define Objetives for Cybersecurity Tabletop Exercises by Lester Chng
Khoury-Avila-Brunelle-Mamadou
How Secure is Code Generated by ChatGPT ? by Khoury-Avila-Brunelle-Mamadou
GFCE
Introduction to Tabletop Exercises (TTX) – A practical Guidebook for Organizations by Capgemini for GFCE...
upstream
Global Automotive Cybersecurity Report 2022 – Automotive Cyber Threat Landscape in Light of New Regulations...
CISA
Shifting the Balance of Cybersecurity Risk – Principles and Approaches for Secure-by-Design – Secure-by-Default –...
MORE RESOURCES
CISO Strategics
cyber operations & soc
red - blue & purple teams
THREAT INTELLIGENCE
VULNERABILITIES
CYBER ATTACKS
DATA BREACH
MALLWARE
RANSOMWARE
DDOS ATTACKS
CLOUD SECURITY
IOT SECURITY
ot security
devsecops
hacking
risk & compliance
governance
data privacy
MORE CISO2CISO RESOURCES LIBRARY TO VIEW
CISO Strategics
SOC OPERATIONS
THREAT INTELLIGENCE
vulnerabilities
cyber attacks
RansoNWARE
DDOS ATTACKS
RED - BLUE & PURPLE
DATA BREACH
DATA PRIVACY
CLOUD SECURITY
IOT - OT SECURITY
RISK & COMPLIANCE
DEVSECOPS
Views: 0