CISO-in-a-Box 🛡️
Getting Started
Getting Started
Risk & Threat Management
Understanding Enterprise Risk Management (ERM) for CISOs
Cyber Attacks and Defense: Threat Intelligence, Adversaries, and Collective Defense
Mapping Your Attack Surface
Security Controls
Overview of CIS18 Critical Security Controls
Security Architecture and Engineering
Product and Software Security
Secure Business Process Optimization
Security Program
Identity and Access Management (IAM) Overview
CISO Security Management Strategy Guide
Security Leadership Strategy Guide for CISOs
Security Awareness: Building a Human Firewall
Cybersecurity Operations (SecOps) Program Maturity Guide
Cyber Incident Response Strategy Guide for CISOs
Cybersecurity and IT Career Pathways
Compliance & Resilience
Governance, Risk & Compliance (GRC) Strategy Guide for Cybersecurity Programs
Business Continuity Planning BCP
Disaster Recovery DR
Vulnerability Management and Risk
Frameworks and Standards
Cyber Insurance
Resources
Resources
Placeholder