Get Help: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 2: | Line 2: | ||
|- | |- | ||
| rowspan="2" style="vertical-align: middle; border: none; width: 25%;" | [[File:german-shepherds.png|frameless|225px|center|link=Need_Help?]] | | rowspan="2" style="vertical-align: middle; border: none; width: 25%;" | [[File:german-shepherds.png|frameless|225px|center|link=Need_Help?]] | ||
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Events<br>[[File:Migrating_leatherback_sea_turtles_1.png|frameless|75px|link=Events]]</div><div style="font-size:smaller; font-weight:normal; text-align: left"> | | style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Events<br>[[File:Migrating_leatherback_sea_turtles_1.png|frameless|75px|link=Events]]</div><div style="font-size:smaller; font-weight:normal; text-align: left;"> | ||
* Conferences, Roundtables, and Meetups | * Conferences, Roundtables, and Meetups | ||
* Virtual, In Person, and Combined Events | * Virtual, In Person, and Combined Events | ||
* Free and For a Fee Events | * Free and For a Fee Events | ||
</div> | </div> | ||
| style="vertical-align: middle; border: none; text-align: center; width: 25%;" | <div style="position:relative; font-weight:bold;">Social Media<br>[[File:Swarming_monarch_butterflies_2.png|frameless|75px|link=Ransomware]]</div><div style="font-size:smaller; font-weight:normal;"> | | style="vertical-align: middle; border: none; text-align: center; width: 25%;" | <div style="position:relative; font-weight:bold;">Social Media<br>[[File:Swarming_monarch_butterflies_2.png|frameless|75px|link=Ransomware]]</div><div style="font-size:smaller; font-weight:normal; text-align: left;"> | ||
* Podcast Series | |||
* YouTube Channels | |||
* LinkedIn Groups | |||
</div> | |||
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="position:relative; font-weight:bold;">Phishing<br>[[File:ACT_Phishing_Icon.svg|frameless|75px|link=Phishing]]<div style="font-size:smaller; font-weight:normal;">Deceptive tactics used to trick users into revealing sensitive information such as passwords or personal details.</div></div> | | style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="position:relative; font-weight:bold;">Phishing<br>[[File:ACT_Phishing_Icon.svg|frameless|75px|link=Phishing]]<div style="font-size:smaller; font-weight:normal;">Deceptive tactics used to trick users into revealing sensitive information such as passwords or personal details.</div></div> | ||
|- | |- |
Revision as of 00:20, 18 August 2023
|
|
||
Social Media
Podcasts
YouTube
Linked-In Groups - COMING SOON
OTHER RESOURCES - COMING SOON
Training Resources
- Training & Awareness
- Awareness Testing
- Tool Specific Training
Cybersecurity Consultants & Service Providers
- Volunteer Cybersecurity Organizations
- Commercial Cybersecurity Consultants
- Managed Security Service Providers
Self-Service Tools & Services
- Inventory Tools
- Incident Response Simulators
- Self-Assessment Tools
Publications
- Analysis Reports
- Periodicals
- Newsletters & Blogs