Get Help: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 18: | Line 18: | ||
| style="vertical-align: middle; border: none; text-align: center;" | <div style="position:relative; font-weight:bold;">Insiders<br>[[File:ACT_Insiders_Icon.svg|frameless|75px|link=Insiders]]<div style="font-size:smaller; font-weight:normal;">Trusted individuals who cause operational disruptions, leak sensitive data, or commit fraud.</div></div> | | style="vertical-align: middle; border: none; text-align: center;" | <div style="position:relative; font-weight:bold;">Insiders<br>[[File:ACT_Insiders_Icon.svg|frameless|75px|link=Insiders]]<div style="font-size:smaller; font-weight:normal;">Trusted individuals who cause operational disruptions, leak sensitive data, or commit fraud.</div></div> | ||
|} | |} | ||
=OTHER RESOURCES - COMING SOON= | =OTHER RESOURCES - COMING SOON= |
Revision as of 00:36, 18 August 2023
|
|
||
OTHER RESOURCES - COMING SOON
Training Resources
- Training & Awareness
- Awareness Testing
- Tool Specific Training
Cybersecurity Consultants & Service Providers
- Volunteer Cybersecurity Organizations
- Commercial Cybersecurity Consultants
- Managed Security Service Providers
Self-Service Tools & Services
- Inventory Tools
- Incident Response Simulators
- Self-Assessment Tools
Publications
- Analysis Reports
- Periodicals
- Newsletters & Blogs