Get Help: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
Line 14: Line 14:
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" |
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" |
<div style="position:relative; font-weight:bold;">Training & Awareness<br>
<div style="position:relative; font-weight:bold;">Training & Awareness<br>
[[File:german-shepherds.png|frameless|75px|center|link=Training & Awareness]]<div style="font-size:smaller; font-weight:normal;">Deceptive tactics used to trick users into revealing sensitive information such as passwords or personal details.</div></div>
[[File:german-shepherds.png|frameless|75px|center|link=Training & Awareness]]<div style="font-size:smaller; font-weight:normal; text-align=left;">
* Training & Awareness
* Awareness Testing
* Tool Specific Training
</div>
</div>
|-
|-
| style="vertical-align: middle; border: none; text-align: center;" | <div style="position:relative; font-weight:bold;">Social Engineering<br>[[File:ACT_Social_Engineering_Icon.svg|frameless|75px|link=Social_Engineering]]
| style="vertical-align: middle; border: none; text-align: center;" | <div style="position:relative; font-weight:bold;">Social Engineering<br>[[File:ACT_Social_Engineering_Icon.svg|frameless|75px|link=Social_Engineering]]

Revision as of 00:43, 18 August 2023

German-shepherds.png
Events
Migrating leatherback sea turtles 1.png
  • Conferences, Roundtables, and Meetups
  • Virtual, In Person, and Combined Events
  • Free and For a Fee Events
Social Media
Swarming monarch butterflies 2.png
  • Cybersecurity Podcasts
  • Cybersecurity YouTube Channels
  • Cybersecurity LinkedIn Groups
Training & Awareness
German-shepherds.png
  • Training & Awareness
  • Awareness Testing
  • Tool Specific Training
Social Engineering
ACT Social Engineering Icon.svg
  • Training & Awareness
  • Awareness Testing
  • Tool Specific Training
Data Breach
ACT Data Breach Icon.svg
Unauthorized access to sensitive data, resulting in potential identity theft and privacy breaches.
Insiders
ACT Insiders Icon.svg
Trusted individuals who cause operational disruptions, leak sensitive data, or commit fraud.

OTHER RESOURCES - COMING SOON

Cybersecurity Consultants & Service Providers

  • Volunteer Cybersecurity Organizations
  • Commercial Cybersecurity Consultants
  • Managed Security Service Providers

Self-Service Tools & Services

  • Inventory Tools
  • Incident Response Simulators
  • Self-Assessment Tools

Publications

  • Analysis Reports
  • Periodicals
  • Newsletters & Blogs