Utilize these respected and comprehensive cyber security resources.
- Next Steps in Playbook Driven Cyber Security
- Aspen Cybersecurity Group: An Operational Collaboration Framework
- 2018 CMO Cybersecurity Survey Key Findings
- Building a National Cybersecurity Strategy: Voluntary, Flexible Frameworks
- Cybersecurity Framework
- Cybersecurity Framework References, FAQ, etc.
- Information Sharing and Analysis Organizations
- May 2017 U.S. Government Cyber Executive Order
- Federal Funding Recs for R&D Relating to Improving Computer Code Security
- NIST Computer Security Incident Handling Guide
The CTA Assets
Download and share these materials that tell the story of the CTA.
Next Steps in Playbook Driven Cyber Security
CTA Joint Analysis on Securing Edge Devices
Key Findings: The Illicit Cryptocurrency Mining Threat
CTA Illicit CryptoMining Whitepaper
Adversary Playbook Principles