Get Help: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
 
(37 intermediate revisions by the same user not shown)
Line 2: Line 2:
|-
|-
| rowspan="2" style="vertical-align: middle; border: none; width: 25%;" | [[File:german-shepherds.png|frameless|225px|center|link=Need_Help?]]
| rowspan="2" style="vertical-align: middle; border: none; width: 25%;" | [[File:german-shepherds.png|frameless|225px|center|link=Need_Help?]]
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Events<br>[[File:Migrating_leatherback_sea_turtles_1.png|frameless|75px|link=Events]]</div><div style="font-size:smaller; font-weight:normal; text-align: left">
| style="vertical-align: middle; border: none; background-color: #FFFFFF; text-align: center; width: 25%;" | <div style="font-weight:bold;">[[Cybercrime Prevention, Reporting, & Recovery|Cybercrime Victim Resources]]<br>[[File:Meerkat colony 1.png|frameless|75px|link=Cybercrime Prevention, Reporting, & Recovery]]</div><div style="font-size:smaller; font-weight:normal; text-align: left;">
* Conferences, Roundtables, and Meetups
* How to avoid becoming a victim.
* Virtual, In Person, and Combined Events
* Response and recovery resources.
* Free and For a Fee Events
* Where to report cybercrimes.
</div>
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="position:relative; font-weight:bold;">[[Social Media|Social Media]]<br>[[File:Swarming_monarch_butterflies_2.png|frameless|75px|link=Social Media]]</div><div style="font-size:smaller; font-weight:normal; text-align: left;">
* Cybersecurity Podcasts
* Cybersecurity YouTube Channels
* Cybersecurity LinkedIn Groups
</div>
| style="vertical-align: middle; border: none; background-color: #FFFFFF; text-align: center; width: 25%;" |
<div style="position:relative; font-weight:bold;">[[Training & Certification|Training & Certification]]<br>
[[File:Wolf.png|frameless|75px|center|link=Training & Certification]]
<div style="font-size:smaller; font-weight:normal; text-align:left;">
* University Programs & Ad Hoc Courses
* Security Certification Programs
* Tool Specific Training Resources
</div>
</div>
</div>
| style="vertical-align: middle; border: none; text-align: center; width: 25%;" | <div style="position:relative; font-weight:bold;">Social Media<br>[[File:Swarming_monarch_butterflies_2.png|frameless|75px|link=Ransomware]]</div><div style="font-size:smaller; font-weight:normal;">A type of malware that encrypts files and demands a ransom for their release.</div>
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="position:relative; font-weight:bold;">Phishing<br>[[File:ACT_Phishing_Icon.svg|frameless|75px|link=Phishing]]<div style="font-size:smaller; font-weight:normal;">Deceptive tactics used to trick users into revealing sensitive information such as passwords or personal details.</div></div>
|-
|-
| style="vertical-align: middle; border: none; text-align: center;" | <div style="position:relative; font-weight:bold;">Social Engineering<br>[[File:ACT_Social_Engineering_Icon.svg|frameless|75px|link=Social_Engineering]]<div style="font-size:smaller; font-weight:normal;">Manipulative techniques exploiting human behavior to gain unauthorized access to systems.</div></div>
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center;" | <div style="position:relative; font-weight:bold;">[[Consultants & Service Providers|Consultants & Service Providers]]<br>[[File:Peregrine_falcon_2.png|frameless|75px|link=Consulting_&_Service_Providers]]
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center;" | <div style="position:relative; font-weight:bold;">Data Breach<br>[[File:ACT_Data_Breach_Icon.svg|frameless|75px|link=Data_Breach]]<div style="font-size:smaller; font-weight:normal;">Unauthorized access to sensitive data, resulting in potential identity theft and privacy breaches.</div></div>
<div style="font-size:smaller; font-weight:normal; text-align:left;">
| style="vertical-align: middle; border: none; text-align: center;" | <div style="position:relative; font-weight:bold;">Insiders<br>[[File:ACT_Insiders_Icon.svg|frameless|75px|link=Insiders]]<div style="font-size:smaller; font-weight:normal;">Trusted individuals who cause operational disruptions, leak sensitive data, or commit fraud.</div></div>
|}
 
 
==Events==
* [https://www.google.com/search?q=cybersecurity+events+2023&oq=cybersecurity+events&ibp=htl;events&rciv=evn&sa=X&ved=2ahUKEwjtvfCood-AAxVVmbAFHcTnCgIQ8eoFKAJ6BAhkEA8#htivrt=events&fpstate=tldetail Search for Cybersecurity Events with Google]
* InfoSec Conferences: [https://infosec-conferences.com/ General Search], or by [https://infosec-conferences.com/filter/#searchcategories Category], [https://infosec-conferences.com/filter/#searchcountries Country], or [https://infosec-conferences.com/filter/#searchstates US State]
* SecurityWeek's [https://www.securitysummits.com/ Security Summits - Virtual Events List]
* SANS Institute's [https://www.sans.org/mlp/free-cybersecurity-events/ Free Cybersecurity Events]
* Eventbrite's [https://www.eventbrite.com/d/online/free--events/security-conference/ Free Security Conferences]
* Conference Index: [https://conferenceindex.org/conferences/cybersecurity Cybersecurity Conferences]
* dev.events: [https://dev.events/security Cybersecurity / InfoSec Conferences 2023 / 2024]
* ISMG Events: [https://ismg.events/summits/ Attend a Summit], [https://ismg.events/engage/ Engage & Network], or [https://ismg.events/roundtables/ Find Executive Roundtables]
 
=Social Media=
==[[Cybersecurity Podcasts|Podcasts]]==
 
==[[Cybersecurity YouTube Channels|YouTube]]==
 
==[[Cybersecurity Linked-In Groups|Linked-In Groups - COMING SOON]]==
 
=OTHER RESOURCES - COMING SOON=
==Training Resources==
* Training & Awareness
* Awareness Testing
* Tool Specific Training
 
==Cybersecurity Consultants & Service Providers==
* Volunteer Cybersecurity Organizations
* Volunteer Cybersecurity Organizations
* Commercial Cybersecurity Consultants
* Commercial Cybersecurity Consultants
* Managed Security Service Providers
* Managed Security Service Providers
 
</div>
==Self-Service Tools & Services==
</div>
* Inventory Tools
| style="vertical-align: middle; border: none; background-color: #FFFFFF; text-align: center;" | <div style="position:relative; font-weight:bold;">[[Self-Service Tools & Funding|Self-Service Tools & Funding]]<br>[[File:Beavers.png|frameless|75px|link=Self-Service_Tools_&_Funding]]
<div style="font-size:smaller; font-weight:normal; text-align:left;">
* Self-Assessment & Inventory Tools
* Incident Response Simulators
* Incident Response Simulators
* Self-Assessment Tools
* Financial Aid Sources
 
</div></div>
==Publications==
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center;" | <div style="position:relative; font-weight:bold;">[[Publications|Publications]]<br>[[File:Inquisitive_raven_2.png|frameless|75px|link=Publications]]
<div style="font-size:smaller; font-weight:normal; text-align:left;">
* Analysis Reports
* Analysis Reports
* Periodicals
* Periodicals
* Newsletters & Blogs
* Newsletters & Blogs
</div></div>
|}

Latest revision as of 05:35, 30 April 2024

German-shepherds.png
  • How to avoid becoming a victim.
  • Response and recovery resources.
  • Where to report cybercrimes.
  • Cybersecurity Podcasts
  • Cybersecurity YouTube Channels
  • Cybersecurity LinkedIn Groups
Training & Certification
Wolf.png
  • University Programs & Ad Hoc Courses
  • Security Certification Programs
  • Tool Specific Training Resources
Consultants & Service Providers
Peregrine falcon 2.png
  • Volunteer Cybersecurity Organizations
  • Commercial Cybersecurity Consultants
  • Managed Security Service Providers
Self-Service Tools & Funding
Beavers.png
  • Self-Assessment & Inventory Tools
  • Incident Response Simulators
  • Financial Aid Sources
Publications
Inquisitive raven 2.png
  • Analysis Reports
  • Periodicals
  • Newsletters & Blogs