davidski / tidyrisk-workshop
🎓Materials for the Hands-On Introduction to OpenFAIR Risk Analysis with Tidyrisk
☆13Updated 3 years ago
Alternatives and similar repositories for tidyrisk-workshop:
Users that are interested in tidyrisk-workshop are comparing it to the libraries listed below
- ⚖Open Source Toolkit for Conducting Quantitative Risk Assessment Interviews☆35Updated 10 months ago
- Factor Analysis of Information Risk (FAIR) tool developed in R☆20Updated 6 years ago
- ⚖Open Source Toolkit for Quantitative Risk Assessment☆163Updated 2 years ago
- ☆44Updated last year
- R package to work with the Shodan API☆18Updated 6 years ago
- NIST SP 800-53 Rev 5 as Data☆23Updated 4 years ago
- Controls Assessment Specification☆68Updated 7 months ago
- ⚔️MITRE ATT&CK Machinations in R☆23Updated 4 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆37Updated last year
- Analyst tool for creating pivot maps of data sources☆17Updated 7 years ago
- Repository for the Open Information Security Risk Universe☆63Updated 2 years ago
- MITRE ATT&CK Based App in Power BI☆13Updated 10 months ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆37Updated 4 years ago
- Factor Analysis of Information Risk (FAIR) model written in Python. Managed and maintained by Hive Systems☆95Updated 2 weeks ago
- setup zeek, previously Bro IDS☆17Updated last month
- A collection of scripts to look various things up in VERIS data such as VCDB.☆12Updated 7 years ago
- Adversary Emulation Planner☆38Updated 6 months ago
- A Secure Controls Framework (SCF) Power BI App☆16Updated 2 months ago
- ☆54Updated 3 years ago
- R package for working with VERIS data☆22Updated last year
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆35Updated 3 years ago
- Incident Response Playbooks☆14Updated 5 years ago
- NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations☆37Updated 2 weeks ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆70Updated 2 months ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- A Zeek package that detects Zoom logins and meeting joins☆12Updated 4 years ago
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆48Updated last year
- ☆16Updated 3 years ago
- R interface to the Censys "cyber"/scans search engine • https://www.censys.io/tutorial☆15Updated 2 years ago