Smoky D. Bear, Canada
Not as different as people think and getting closer every day.
Slides from SANS DFIR Pipeline Forensics talk
Yes, this is a very sparse web site. Don't expect changes very often.
CSA Z246.1:21 | Product | CSA Group
N290.7-14 (R2021) | Product | CSA Group - Cyber security for nuclear power plants and small reactor facilities
Cybersecurity Framework | NIST
CIS Critical Security Controls Version 8.1
Essential Eight | Cyber.gov.au
Information Security Policy Templates | SANS Institute
Microsoft Word - 2007-HTRAM-Eng-Word2002-classroom-1023.doc - RCMPs Harmopnized Threat Risk Assesment (HTRA)
Course category : ASTRA - Threat Risk Assessment - Cyber Centre Learning Hub
Downloading and Installing CSET | CISA
From Zero to GRC in Minutes with SimpleRisk
Cybersecurity Risk Foundation | Home
Cyber Security Posters | SANS Institute
Improving Industrial Cybersecurity | ICS4ICS Program by ISAGCA
SIFT Workstation | SANS Institute
Drag Your Adolescent Incident-Response Program Into Adulthood - Dark Reading
CrowdStrike Services Releases Free Incident Response Tracker
Incident response planning: When to call in the lawyers
Make a Passive Network Tap : 7 Steps - Instructables
Free & Affordable Training - DFIR Diva
ICS Cybersecurity Training - Idaho National Laboratory
Education and community - Canadian Centre for Cyber Security
4 Tips for a Strong Executive Summary of a Security Assessment Report
PLC: Towards Viable Cyber Extortion for Operational Technology
Control Loop: The OT Cybersecurity Podcast
GitHub - wavestone-cdt/dyode: A low-cost, DIY data diode for ICS
ModbusPal - Java MODBUS simulator
Autonomy – Open-source PLC Software
Techniques - ICS | MITRE ATT&CK®
Mick Douglas 🇺🇦🌻 (@bettersafetynet) / X
Jake Williams (@MalwareJake) / X
Schneier on Security - Bruce Schneier
Father of modern-day password regrets original guidance - CBS News
Your Free URL Unshortener Tool | Check Short URL
Proactive Preparation and Hardening to Protect Against Destructive Attacks | Blog | Mandiant |
Ransom.Wiki - Check if your company or partner is in a ransom attack breach