ericiussecurity / ProjectKeystoneLinks
Any good cybersecurity program needs the policies and plans to get it started and give it direction. This is our take on a starting point
☆19Updated 2 years ago
Alternatives and similar repositories for ProjectKeystone
Users that are interested in ProjectKeystone are comparing it to the libraries listed below
Sorting:
- Some of the tools we use during vCISO engagements☆15Updated 3 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆72Updated 7 months ago
- ☆45Updated 2 years ago
- Cybersecurity Incident Response Plan☆91Updated 4 years ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆112Updated 6 months ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆115Updated 7 months ago
- ☆13Updated last year
- InsightVM helpful SQL queries☆64Updated 3 months ago
- ☆83Updated 3 months ago
- ☆95Updated 2 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆70Updated 5 years ago
- DDTTX Tabletop Trainings☆28Updated 3 years ago
- Conference presentations☆47Updated last year
- Tools for simulating threats☆185Updated last year
- A list of Splunk queries that I've collected and used over time.☆83Updated 4 years ago
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆124Updated last week
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 7 months ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Updated 3 years ago
- MISP to Sentinel integration☆67Updated last week
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆82Updated last year
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆60Updated 4 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- Repository of public reference frameworks for the DFIR community.☆116Updated last year
- ☆54Updated 3 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆141Updated last week
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆39Updated 3 months ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆201Updated 5 years ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated last year
- Real-time Response scripts and schema☆113Updated last year
- ☆59Updated last year