Get Help: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
Line 12: Line 12:
* Cybersecurity LinkedIn Groups
* Cybersecurity LinkedIn Groups
</div>
</div>
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="position:relative; font-weight:bold;">Phishing<br>[[File:ACT_Phishing_Icon.svg|frameless|75px|link=Phishing]]<div style="font-size:smaller; font-weight:normal;">Deceptive tactics used to trick users into revealing sensitive information such as passwords or personal details.</div></div>
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" |
<div style="position:relative; font-weight:bold;">Training & Awareness<br>
[[File:german-shepherds.png|frameless|75px|center|link=Training & Awareness]]<div style="font-size:smaller; font-weight:normal;">Deceptive tactics used to trick users into revealing sensitive information such as passwords or personal details.</div></div>
|-
|-
| style="vertical-align: middle; border: none; text-align: center;" | <div style="position:relative; font-weight:bold;">Social Engineering<br>[[File:ACT_Social_Engineering_Icon.svg|frameless|75px|link=Social_Engineering]]<div style="font-size:smaller; font-weight:normal;">Manipulative techniques exploiting human behavior to gain unauthorized access to systems.</div></div>
| style="vertical-align: middle; border: none; text-align: center;" | <div style="position:relative; font-weight:bold;">Social Engineering<br>[[File:ACT_Social_Engineering_Icon.svg|frameless|75px|link=Social_Engineering]]
<div style="font-size:smaller; font-weight:normal; text-align=left;">
* Training & Awareness
* Awareness Testing
* Tool Specific Training
</div>
</div>
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center;" | <div style="position:relative; font-weight:bold;">Data Breach<br>[[File:ACT_Data_Breach_Icon.svg|frameless|75px|link=Data_Breach]]<div style="font-size:smaller; font-weight:normal;">Unauthorized access to sensitive data, resulting in potential identity theft and privacy breaches.</div></div>
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center;" | <div style="position:relative; font-weight:bold;">Data Breach<br>[[File:ACT_Data_Breach_Icon.svg|frameless|75px|link=Data_Breach]]<div style="font-size:smaller; font-weight:normal;">Unauthorized access to sensitive data, resulting in potential identity theft and privacy breaches.</div></div>
| style="vertical-align: middle; border: none; text-align: center;" | <div style="position:relative; font-weight:bold;">Insiders<br>[[File:ACT_Insiders_Icon.svg|frameless|75px|link=Insiders]]<div style="font-size:smaller; font-weight:normal;">Trusted individuals who cause operational disruptions, leak sensitive data, or commit fraud.</div></div>
| style="vertical-align: middle; border: none; text-align: center;" | <div style="position:relative; font-weight:bold;">Insiders<br>[[File:ACT_Insiders_Icon.svg|frameless|75px|link=Insiders]]<div style="font-size:smaller; font-weight:normal;">Trusted individuals who cause operational disruptions, leak sensitive data, or commit fraud.</div></div>
Line 20: Line 28:


=OTHER RESOURCES - COMING SOON=
=OTHER RESOURCES - COMING SOON=
==Training Resources==
* Training & Awareness
* Awareness Testing
* Tool Specific Training
==Cybersecurity Consultants & Service Providers==
==Cybersecurity Consultants & Service Providers==
* Volunteer Cybersecurity Organizations
* Volunteer Cybersecurity Organizations

Revision as of 00:41, 18 August 2023

German-shepherds.png
Events
Migrating leatherback sea turtles 1.png
  • Conferences, Roundtables, and Meetups
  • Virtual, In Person, and Combined Events
  • Free and For a Fee Events
Social Media
Swarming monarch butterflies 2.png
  • Cybersecurity Podcasts
  • Cybersecurity YouTube Channels
  • Cybersecurity LinkedIn Groups
Training & Awareness
German-shepherds.png
Deceptive tactics used to trick users into revealing sensitive information such as passwords or personal details.
Social Engineering
ACT Social Engineering Icon.svg
  • Training & Awareness
  • Awareness Testing
  • Tool Specific Training
Data Breach
ACT Data Breach Icon.svg
Unauthorized access to sensitive data, resulting in potential identity theft and privacy breaches.
Insiders
ACT Insiders Icon.svg
Trusted individuals who cause operational disruptions, leak sensitive data, or commit fraud.

OTHER RESOURCES - COMING SOON

Cybersecurity Consultants & Service Providers

  • Volunteer Cybersecurity Organizations
  • Commercial Cybersecurity Consultants
  • Managed Security Service Providers

Self-Service Tools & Services

  • Inventory Tools
  • Incident Response Simulators
  • Self-Assessment Tools

Publications

  • Analysis Reports
  • Periodicals
  • Newsletters & Blogs