Phenomenati
Phenomenati
  • Home
  • The Future
    • Cyber Entropy™
    • The Decisive SOC
    • Augmented Intelligence
    • A SOC Taxonomy
  • Services
    • Cyber101 for the Board
    • Cyber Risk Assessments
    • Cyber ShadowBreaker™
    • Cybersecurity Strategy
    • Cybersecurity Design
    • Risk Level Agreements
    • SecOps Communications
    • Case Studies
  • Partners
    • Technology Vendors
    • Service Providers
  • About
    • Leadership
    • Contact Us
  • Resource Center
    • Essential Reading/Viewing
    • Frameworks, Standards
    • Threat Intel & Dashboards
    • Industry ISACs
    • Cyber Reconnaissance
    • Vulnerability Management
    • Scanning & Pen Testing
    • Monitoring, IDS, SIEM
    • IOC Scanning
    • Analytics
    • Rootkit Detection
    • Incident Response
    • DFIR Resources
  • More
    • Home
    • The Future
      • Cyber Entropy™
      • The Decisive SOC
      • Augmented Intelligence
      • A SOC Taxonomy
    • Services
      • Cyber101 for the Board
      • Cyber Risk Assessments
      • Cyber ShadowBreaker™
      • Cybersecurity Strategy
      • Cybersecurity Design
      • Risk Level Agreements
      • SecOps Communications
      • Case Studies
    • Partners
      • Technology Vendors
      • Service Providers
    • About
      • Leadership
      • Contact Us
    • Resource Center
      • Essential Reading/Viewing
      • Frameworks, Standards
      • Threat Intel & Dashboards
      • Industry ISACs
      • Cyber Reconnaissance
      • Vulnerability Management
      • Scanning & Pen Testing
      • Monitoring, IDS, SIEM
      • IOC Scanning
      • Analytics
      • Rootkit Detection
      • Incident Response
      • DFIR Resources
  • Home
  • The Future
    • Cyber Entropy™
    • The Decisive SOC
    • Augmented Intelligence
    • A SOC Taxonomy
  • Services
    • Cyber101 for the Board
    • Cyber Risk Assessments
    • Cyber ShadowBreaker™
    • Cybersecurity Strategy
    • Cybersecurity Design
    • Risk Level Agreements
    • SecOps Communications
    • Case Studies
  • Partners
    • Technology Vendors
    • Service Providers
  • About
    • Leadership
    • Contact Us
  • Resource Center
    • Essential Reading/Viewing
    • Frameworks, Standards
    • Threat Intel & Dashboards
    • Industry ISACs
    • Cyber Reconnaissance
    • Vulnerability Management
    • Scanning & Pen Testing
    • Monitoring, IDS, SIEM
    • IOC Scanning
    • Analytics
    • Rootkit Detection
    • Incident Response
    • DFIR Resources

Resource Center

A collection of useful Resources for Cyber Security Operations practitioners, or those building/evolving a SOC. 

Cyber Security Frameworks

Cybersecurity Maturity Models

Cybersecurity Maturity Models

CIS Critical Security Controls 


ISO 27001/27002


NIST Cybersecurity Framework (CSF)


NIST Framework for Improving Critical Infrastructure Security 


ISACA's COBIT 5 (now 2019)


COSO - Committee of Sponsoring Organizations of the Treadway Commission


PCI DSS


HITRUST CSF


US-CERT  Cybersecurity Framework(s) 

for Industries

Cybersecurity Maturity Models

Cybersecurity Maturity Models

Cybersecurity Maturity Models

NICE

National Initiative for Cybersecurity Education

Capability Maturity Model


CMMI Institute's Cybermaturity Platform

 

SSE-CMM

Systems Security Engineering

Capability Maturity Model


O-ISM3

Open Information Security Management Maturity Model

from the Open Group


C2M2

Cybersecurity Capability Maturity Model

from the U.S. DOE


"IAMM"

IA Maturity Model

from U.K.'s GCHQ

 

CCSMM

Community Cyber Security Maturity Model

from the 

Center for Infrastructure Assurance and Security (CIAS)

Languages of Cyber Security

Languages of Cyber Security

Languages of Cyber Security

CAPEC™

CybOX™

IODEF

IDMEF (RFC 4765)

MAEC™

OpenIOC

STIX™

TAXII™

VERIS

Metrics

Languages of Cyber Security

Languages of Cyber Security

Making Security Measurable™

Copyright © 2023 Phenomenati - All Rights Reserved.


This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept