Security Technology & Operations
Topics
Types of Content
Phishing Frenzy – Simple Security ScenarioAn example tabletop scenario that can be used for a tabletop exercise. |
|
Tabletop Facilitation Script TemplateA template that can be used to develop a facilitation script for a tabletop exercise. |
|
Stormfront Shutdown – Simple BCDR ScenarioAn example tabletop scenario that can be used for a tabletop exercise. |
|
Room for Risk – Moderate Security ScenarioAn example tabletop scenario that can be used for a tabletop exercise. |
|
Cross-Network Contagion – Moderate BCDR and Security ScenarioAn example tabletop scenario that can be used for a tabletop exercise. |
|
Silent Intrusion – Complex BCDR and Security ScenarioAn example tabletop scenario that can be used for a tabletop exercise. |
|
Deepfake Disaster – Moderate Security ScenarioAn example tabletop scenario that can be used for a tabletop exercise. |
|
Data Center Disruption – Simple BCDR ScenarioAn example tabletop scenario that can be used for a tabletop exercise. |
|
An Evaluation of Gurucul's Identity Security Analytics PlatformFrom the outset, Gurucul positioned itself as a pioneer in what would later be known as user and entity behavior analytics (UEBA). This early focus allowed Gurucul to... |
|
Threat Landscape Briefing – February 2025This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control strategies and exposure... |
|