carlota / showmethemoney
These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and the executives/business owners.
☆71Updated 6 months ago
Alternatives and similar repositories for showmethemoney:
Users that are interested in showmethemoney are comparing it to the libraries listed below
- NIST CyberSecurity Framework management tool☆163Updated 3 years ago
- ☆94Updated 2 years ago
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆123Updated 2 weeks ago
- ☆131Updated last year
- Resources for SANS CTI Summit 2021 presentation☆102Updated last year
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆111Updated 5 months ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- ☆42Updated 2 years ago
- Cyber Incident Response Team Playbook Battle Cards☆375Updated 11 months ago
- Cybersecurity Incident Response Plan☆90Updated 4 years ago
- ☆54Updated 3 years ago
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆117Updated 9 months ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆114Updated 6 months ago
- Controls Assessment Specification☆69Updated last month
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆49Updated last month
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆62Updated 2 years ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 6 months ago
- ☆118Updated last year
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆211Updated last month
- Any good cybersecurity program needs the policies and plans to get it started and give it direction. This is our take on a starting point☆18Updated 2 years ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆386Updated last year
- ☆44Updated 2 years ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆162Updated 2 months ago
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆76Updated this week
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆85Updated 4 years ago
- ☆73Updated 2 years ago
- Open FAIR Course☆13Updated 5 years ago
- DDTTX Tabletop Trainings☆28Updated 3 years ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆231Updated last month