The Nightmare on Cryptville Street: 20 Pills for a Night of Sleep

"This paper uses a case study approach to help individuals learn about the Critical Controls for Effective Cyber Defense. By developing a scenario built around a ransomware incident, this case study is intended to be a context for students to use in applying the Critical Security Controls against one of the attack methods progressively used by cybercriminals in the past 5 years"

Spotlight

Magnet Forensics

Magnet Forensics is a global leader in the development of digital forensics software that acquires, analyzes and shares evidence from computers, smartphones and tablets. Magnet Forensics has been helping examiners and investigators fight crime, protect assets and guard national security since 2009. Magnet Forensics has become a trusted partner for thousands of the world’s top law enforcement, government, military and corporate organizations in over 92 countries. Court-admissible evidence recovered by Magnet Forensics tools has been used to support a wide-variety of investigations including cybercrimes, child exploitation, terrorism, human resource disputes, fraud, and intellectual property theft.

OTHER WHITEPAPERS
news image

Privileged Remote Access Security in Cloud Whitepaper

whitePaper | May 5, 2022

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to your organization. BeyondTrust can help your organization stay secure and compliant, while improving the efficiency and success of your organization with a better user experience.

Read More
news image

Cyber Security: Defending your digital business

whitePaper | November 13, 2019

Your business relies on its technology – but lurking around the corner are intruders who can disrupt or devalue your operations. This report shines a light on the sources of the problem, and how you can establish the control you need to get the best from IT. In every corner of the globe, businesses are building new capabilities thatrely on technology. Small businesses are automating previously‐manual processes and digitizing key tasks and information sources. At the same time, large enterprises are dedicating vast resources to analytics and to digital transformation – capitalizing on the reach and opportunities enabled by digitalized processes.

Read More
news image

A Lifeline: Patient Safety and Cybersecurity

whitePaper | December 3, 2019

Healthcare information is unique and personal to us all.Indeed,the patient is at the center of healthcare, as it would not exist if the patient did not exist. Bits and bytes in today’s digital world have real significance when it come to patient care lives are on the line.

Read More
news image

The Definitive WFH Security Checklist: 10 Easy Steps to Safer Remote Access

whitePaper | September 15, 2022

Providing secure, fast remote access is a top priority as the modern workforce has become predominantly remote. Working from home (WFH) or outside the office was once a choice or a stopgap measure, but today, it’s critical for business agility.

Read More
news image

Warring State - China's cybersecurity strategy

whitePaper | December 1, 2019

Cyberspace and information technology have enabled the economic, political, and cultural inte - gration of the United States and China. However, interdependence creates costs as well as benefits. Increased interconnection has also contributed to major obstacles in the bilateral relationship, generating mutual distrust of incentives, actions, and norms in cyberspace. Information technology raises new challenges for states by allowing actors to exploit networks, conduct cyber espionage, or compromise national security with greater ease.

Read More
news image

Cyber Security for Business

whitePaper | December 17, 2019

At CGI, cyber security is part of everything we do. For more than 40 years, we have helped clients manage complex security challenges with a business focused approach – protecting what is most valuable to them. As our economy becomes even more digital in nature, securing our organisations against cyber-attacks and data breaches has become one of the most important business issues facing senior management.

Read More

Spotlight

Magnet Forensics

Magnet Forensics is a global leader in the development of digital forensics software that acquires, analyzes and shares evidence from computers, smartphones and tablets. Magnet Forensics has been helping examiners and investigators fight crime, protect assets and guard national security since 2009. Magnet Forensics has become a trusted partner for thousands of the world’s top law enforcement, government, military and corporate organizations in over 92 countries. Court-admissible evidence recovered by Magnet Forensics tools has been used to support a wide-variety of investigations including cybercrimes, child exploitation, terrorism, human resource disputes, fraud, and intellectual property theft.

Events