davidski / tidyrisk-workshopLinks
🎓Materials for the Hands-On Introduction to OpenFAIR Risk Analysis with Tidyrisk
☆13Updated 4 years ago
Alternatives and similar repositories for tidyrisk-workshop
Users that are interested in tidyrisk-workshop are comparing it to the libraries listed below
Sorting:
- ⚖Open Source Toolkit for Conducting Quantitative Risk Assessment Interviews☆35Updated last year
- Factor Analysis of Information Risk (FAIR) tool developed in R☆21Updated 7 years ago
- ⚖Open Source Toolkit for Quantitative Risk Assessment☆168Updated 2 years ago
- Analyst tool for creating pivot maps of data sources☆16Updated 7 years ago
- R package to work with the Shodan API☆17Updated 7 years ago
- ⚔️MITRE ATT&CK Machinations in R☆22Updated 4 years ago
- Repository for the Open Information Security Risk Universe☆64Updated 2 years ago
- Factor Analysis of Information Risk (FAIR) model written in Python. Managed and maintained by Hive Systems☆94Updated this week
- R package for working with VERIS data☆24Updated last year
- ☆44Updated 2 years ago
- A free incident response management and documentation workbook☆24Updated 6 years ago
- Documentation on the Cyber Defense Matrix☆24Updated 2 years ago
- ☆15Updated 3 years ago
- Daily archiver & triage issue creator for new releases of CISA's Known Exploited Vulnerabilities list☆35Updated this week
- EPSScall☆11Updated 2 years ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 7 months ago
- Open FAIR Course☆13Updated 5 years ago
- R interface to the Censys "cyber"/scans search engine • https://www.censys.io/tutorial☆14Updated 2 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆22Updated 4 months ago
- Incident Response Playbooks☆14Updated 5 years ago
- ☆18Updated 3 years ago
- A Secure Controls Framework (SCF) Power BI App☆21Updated 7 months ago
- A script to create and assign SOP tasks into the cases☆19Updated 4 years ago
- Automating simple report creating of threat intelligence using ChatGPT and Greynoise API.☆10Updated last year
- Adversary Emulation Planner☆39Updated 11 months ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆37Updated 4 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- NIST 800-53 Baseline Configuration Tool☆13Updated 9 months ago
- ☆11Updated 4 years ago
- KEV EPSS Data☆25Updated this week