Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide guidance for quality processes, and provide benchmark for appraising current processes outcomes.
☆265Jul 5, 2025Updated 9 months ago
Alternatives and similar repositories for awesome-CISO-maturity-models
Users that are interested in awesome-CISO-maturity-models are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆494Jun 12, 2025Updated 10 months ago
- Questions to ask about the team and company when you're interviewing for a CISO position☆15Oct 19, 2021Updated 4 years ago
- Some of the tools we use during vCISO engagements☆17Apr 23, 2022Updated 3 years ago
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆145Jan 2, 2026Updated 3 months ago
- Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events,…☆1,294Apr 6, 2026Updated last week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Discover and watch the latest cybersecurity conference talks. A curated archive of public security conference content.☆282Apr 12, 2026Updated last week
- Continuous Threat Exposure Management Maturity Model (CTEMMM)☆29Feb 6, 2026Updated 2 months ago
- ☆20May 30, 2025Updated 10 months ago
- AI Security Newsletter - A monthly digest of AI security research, insights, reports, upcoming events, and tools & resources☆34Feb 5, 2026Updated 2 months ago
- Curated list of resources for security Governance, Risk Management, Compliance and Audit professionals and enthusiasts (if they exist).☆1,012Sep 7, 2025Updated 7 months ago
- Halberd : Multi-Cloud Agentic Attack Tool☆336Apr 8, 2026Updated last week
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆21Sep 22, 2025Updated 6 months ago
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 6 months ago
- CISO Assistant is a one-stop-shop GRC platform for Risk Management, AppSec, Compliance & Audit, TPRM, Privacy, and Reporting. It supports…☆3,963Updated this week
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- M365 Defender SOC Playbooks☆24Feb 6, 2023Updated 3 years ago
- A collection of resources, tools and more for penetration testing and securing Microsofts cloud platform Azure.☆1,191Dec 27, 2023Updated 2 years ago
- Implementing ISO/IEC 27001:2022, by EC-Council☆17Feb 20, 2026Updated 2 months ago
- Miscellaneous parsing scripts for penetration testing☆12Jul 17, 2023Updated 2 years ago
- A Secure Controls Framework (SCF) Power BI App☆26Nov 3, 2024Updated last year
- Automating situational awareness for cloud penetration tests.☆2,340Apr 12, 2026Updated last week
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆23Feb 2, 2025Updated last year
- Open source cyber-serenity platform that help the security teams designing and managing companies' ISMS, and which allow them to create r…☆18Apr 9, 2026Updated last week
- Reports from various areas of information security☆272Apr 13, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A curated knowledge base to build, run and mature a SOC (including CSIRT).☆1,697Apr 11, 2026Updated last week
- Incident Response Methodologies 2022☆1,113Apr 11, 2025Updated last year
- This is the Network Flow Generator for ICSSIM☆17Aug 28, 2025Updated 7 months ago
- Bloodhound Reporting for Blue and Purple Teams☆1,282Nov 15, 2025Updated 5 months ago
- CA Optics - Azure AD Conditional Access Gap Analyzer☆336Aug 28, 2024Updated last year
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,503Apr 3, 2026Updated 2 weeks ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,747Aug 2, 2024Updated last year
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆496Apr 3, 2024Updated 2 years ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆229Mar 30, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Threat matrix for CI/CD Pipeline☆762Jul 8, 2024Updated last year
- A toolkit to attack Office365☆16Aug 1, 2019Updated 6 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Mar 14, 2021Updated 5 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,588Feb 5, 2026Updated 2 months ago
- Detect Tactics, Techniques & Combat Threats☆2,280Jan 21, 2026Updated 2 months ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Updated this week