Skip to content
The Cyber Resilience Institute
Advancing Critical Infrastructure Protection
Menu
About Us
Programs
Privacy Policy
Contact Us
Sports-ISAO
c-Watch
c-Watch Apprenticeship
c-Watch Accomplishments
c-Watch Course
CrowdWatch
c-Market
Toolkit
Getting Started: Top Resources
Community Building Handbook
Cyber Threat Intelligence Resources
Creating a SOC for the ISAO
S1- Consolidate Computer Network Defense Under One Organization
S2 – Achieve Balance on Size: Agility Ratio
S3 – Give SOC Authority
S4 – Do a Few Things Well
S5- Favor Staff Quality over Quantity
S6 – Maximize the Value of Technology Purchases
S7 – Exercise Discrimination in Data You Gather
S8 – Protect the Security Operations Center Mission
S9 – Be a Sophisticated Consumer and Producer of Cyber Threat Intelligence
S10 – Stop. Think. Respond… Calmly
Training
Summary of Cyber Threat Hunting Models
STIX 2.1 Programmer’s Guide
Integrating CTI Into Your SOC
Blog
Partners
CyberUSA
Global Resilience Federation
National Cybersecurity Center
Terms & conditions
Opt-out preferences
Opt-out preferences