Get Help: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
Line 22: Line 22:
</div>
</div>
|-
|-
| style="vertical-align: middle; border: none; text-align: center;" | <div style="position:relative; font-weight:bold;">Social Engineering<br>[[File:ACT_Social_Engineering_Icon.svg|frameless|75px|link=Social_Engineering]]
| style="vertical-align: middle; border: none; text-align: center;" | <div style="position:relative; font-weight:bold;">Cybersecurity Consultants & Service Providers<br>[[File:Peregrine_falcon_2.png|frameless|75px|link=Social_Engineering]]
<div style="font-size:smaller; font-weight:normal; text-align:left;">
<div style="font-size:smaller; font-weight:normal; text-align:left;">
* Training & Awareness
* Awareness Testing
* Tool Specific Training
</div>
</div>
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center;" | <div style="position:relative; font-weight:bold;">Data Breach<br>[[File:ACT_Data_Breach_Icon.svg|frameless|75px|link=Data_Breach]]<div style="font-size:smaller; font-weight:normal;">Unauthorized access to sensitive data, resulting in potential identity theft and privacy breaches.</div></div>
| style="vertical-align: middle; border: none; text-align: center;" | <div style="position:relative; font-weight:bold;">Insiders<br>[[File:ACT_Insiders_Icon.svg|frameless|75px|link=Insiders]]<div style="font-size:smaller; font-weight:normal;">Trusted individuals who cause operational disruptions, leak sensitive data, or commit fraud.</div></div>
|}
=OTHER RESOURCES - COMING SOON=
==Cybersecurity Consultants & Service Providers==
* Volunteer Cybersecurity Organizations
* Volunteer Cybersecurity Organizations
* Commercial Cybersecurity Consultants
* Commercial Cybersecurity Consultants
* Managed Security Service Providers
* Managed Security Service Providers
 
</div>
==Self-Service Tools & Services==
</div>
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center;" | <div style="position:relative; font-weight:bold;">Self-Service Tools & Resources<br>[[File:Migrating_wildebeest_2.png|frameless|75px|link=Data_Breach]]
<div style="font-size:smaller; font-weight:normal; text-align:left;">
* Inventory Tools
* Inventory Tools
* Incident Response Simulators
* Incident Response Simulators
* Self-Assessment Tools
* Self-Assessment Tools
 
</div></div>
==Publications==
| style="vertical-align: middle; border: none; text-align: center;" | <div style="position:relative; font-weight:bold;">Publications<br>[[File:German-shepherds.png|frameless|75px|link=Insiders]]
<div style="font-size:smaller; font-weight:normal; text-align:left;">
* Analysis Reports
* Analysis Reports
* Periodicals
* Periodicals
* Newsletters & Blogs
* Newsletters & Blogs
</div></div>
|}

Revision as of 00:56, 18 August 2023

German-shepherds.png
Events
Migrating leatherback sea turtles 1.png
  • Conferences, Roundtables, and Meetups
  • Virtual, In Person, and Combined Events
  • Free and For a Fee Events
Social Media
Swarming monarch butterflies 2.png
  • Cybersecurity Podcasts
  • Cybersecurity YouTube Channels
  • Cybersecurity LinkedIn Groups
Training & Awareness
German-shepherds.png
  • Training & Awareness
  • Awareness Testing
  • Tool Specific Training
Cybersecurity Consultants & Service Providers
Peregrine falcon 2.png
  • Volunteer Cybersecurity Organizations
  • Commercial Cybersecurity Consultants
  • Managed Security Service Providers
Self-Service Tools & Resources
Migrating wildebeest 2.png
  • Inventory Tools
  • Incident Response Simulators
  • Self-Assessment Tools
Publications
German-shepherds.png
  • Analysis Reports
  • Periodicals
  • Newsletters & Blogs