Get Help: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 12: | Line 12: | ||
* Cybersecurity LinkedIn Groups | * Cybersecurity LinkedIn Groups | ||
</div> | </div> | ||
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="position:relative; font-weight:bold;"> | | style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | | ||
<div style="position:relative; font-weight:bold;">Training & Awareness<br> | |||
[[File:german-shepherds.png|frameless|75px|center|link=Training & Awareness]]<div style="font-size:smaller; font-weight:normal;">Deceptive tactics used to trick users into revealing sensitive information such as passwords or personal details.</div></div> | |||
|- | |- | ||
| style="vertical-align: middle; border: none; text-align: center;" | <div style="position:relative; font-weight:bold;">Social Engineering<br>[[File:ACT_Social_Engineering_Icon.svg|frameless|75px|link=Social_Engineering]]<div style="font-size:smaller; font-weight:normal;"> | | style="vertical-align: middle; border: none; text-align: center;" | <div style="position:relative; font-weight:bold;">Social Engineering<br>[[File:ACT_Social_Engineering_Icon.svg|frameless|75px|link=Social_Engineering]] | ||
<div style="font-size:smaller; font-weight:normal; text-align=left;"> | |||
* Training & Awareness | |||
* Awareness Testing | |||
* Tool Specific Training | |||
</div> | |||
</div> | |||
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center;" | <div style="position:relative; font-weight:bold;">Data Breach<br>[[File:ACT_Data_Breach_Icon.svg|frameless|75px|link=Data_Breach]]<div style="font-size:smaller; font-weight:normal;">Unauthorized access to sensitive data, resulting in potential identity theft and privacy breaches.</div></div> | | style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center;" | <div style="position:relative; font-weight:bold;">Data Breach<br>[[File:ACT_Data_Breach_Icon.svg|frameless|75px|link=Data_Breach]]<div style="font-size:smaller; font-weight:normal;">Unauthorized access to sensitive data, resulting in potential identity theft and privacy breaches.</div></div> | ||
| style="vertical-align: middle; border: none; text-align: center;" | <div style="position:relative; font-weight:bold;">Insiders<br>[[File:ACT_Insiders_Icon.svg|frameless|75px|link=Insiders]]<div style="font-size:smaller; font-weight:normal;">Trusted individuals who cause operational disruptions, leak sensitive data, or commit fraud.</div></div> | | style="vertical-align: middle; border: none; text-align: center;" | <div style="position:relative; font-weight:bold;">Insiders<br>[[File:ACT_Insiders_Icon.svg|frameless|75px|link=Insiders]]<div style="font-size:smaller; font-weight:normal;">Trusted individuals who cause operational disruptions, leak sensitive data, or commit fraud.</div></div> | ||
Line 20: | Line 28: | ||
=OTHER RESOURCES - COMING SOON= | =OTHER RESOURCES - COMING SOON= | ||
==Cybersecurity Consultants & Service Providers== | ==Cybersecurity Consultants & Service Providers== | ||
* Volunteer Cybersecurity Organizations | * Volunteer Cybersecurity Organizations |
Revision as of 00:41, 18 August 2023
|
|
||
OTHER RESOURCES - COMING SOON
Cybersecurity Consultants & Service Providers
- Volunteer Cybersecurity Organizations
- Commercial Cybersecurity Consultants
- Managed Security Service Providers
Self-Service Tools & Services
- Inventory Tools
- Incident Response Simulators
- Self-Assessment Tools
Publications
- Analysis Reports
- Periodicals
- Newsletters & Blogs