Phenomenati
Phenomenati
  • Home
  • Phenomena
    • Predictions from 1998
    • Cyber Entropy™
    • The Cyber Reckoning
    • Risk Discipline
    • InfoSec Maturity Model
    • The 5 What Imperatives™
    • The Decisive SOC
    • A SOC Taxonomy
  • Services
    • Cyber101 for the Board
    • Cyber Risk Assessments
    • Cyber ShadowBreaker™
    • Cybersecurity Strategy
    • Cybersecurity Design
    • Risk Level Agreements
    • SecOps Communications
    • Case Studies
  • Partners
    • Technology Vendors
    • Service Providers
  • About
    • Leadership
    • Contact Us
  • Resource Center
    • Frameworks, Standards
    • Threat Intel & Dashboards
    • Cyber Reconnaissance
    • Vulnerability Management
    • Scanning & Pen Testing
    • Monitoring, IDS, SIEM
    • Analytics
    • Incident Response
    • DFIR Resources
  • More
    • Home
    • Phenomena
      • Predictions from 1998
      • Cyber Entropy™
      • The Cyber Reckoning
      • Risk Discipline
      • InfoSec Maturity Model
      • The 5 What Imperatives™
      • The Decisive SOC
      • A SOC Taxonomy
    • Services
      • Cyber101 for the Board
      • Cyber Risk Assessments
      • Cyber ShadowBreaker™
      • Cybersecurity Strategy
      • Cybersecurity Design
      • Risk Level Agreements
      • SecOps Communications
      • Case Studies
    • Partners
      • Technology Vendors
      • Service Providers
    • About
      • Leadership
      • Contact Us
    • Resource Center
      • Frameworks, Standards
      • Threat Intel & Dashboards
      • Cyber Reconnaissance
      • Vulnerability Management
      • Scanning & Pen Testing
      • Monitoring, IDS, SIEM
      • Analytics
      • Incident Response
      • DFIR Resources
  • Home
  • Phenomena
    • Predictions from 1998
    • Cyber Entropy™
    • The Cyber Reckoning
    • Risk Discipline
    • InfoSec Maturity Model
    • The 5 What Imperatives™
    • The Decisive SOC
    • A SOC Taxonomy
  • Services
    • Cyber101 for the Board
    • Cyber Risk Assessments
    • Cyber ShadowBreaker™
    • Cybersecurity Strategy
    • Cybersecurity Design
    • Risk Level Agreements
    • SecOps Communications
    • Case Studies
  • Partners
    • Technology Vendors
    • Service Providers
  • About
    • Leadership
    • Contact Us
  • Resource Center
    • Frameworks, Standards
    • Threat Intel & Dashboards
    • Cyber Reconnaissance
    • Vulnerability Management
    • Scanning & Pen Testing
    • Monitoring, IDS, SIEM
    • Analytics
    • Incident Response
    • DFIR Resources

Resource Center

A collection of useful Resources for Cyber Security Operations practitioners, or those building/evolving a SOC.

Incident Response Resources

Incident Response Resources

Incident Response Resources

Slack DFIR channel

Google Rapid Response (GRR) Framework

CIRTkit

Computer Aided Investigative Environment (CAINE)

Cyber Triage

Demisto

Digital Forensics Framework

Doorman

Falcon Orchestrator

Fast Incident Response (FIR)

Fully Integrated Defense Operation (FIDO)

TheHive

Incident Handling Automation Protocol (IHAP)

IRMA

Kansa

Mandiant RedLine

nightHawk

Open Computer Forensics Architecture

Request Tracker (RTIR)

ROCKNSM Response Ops Collection Kit

Sandia Cyber Omni Tracker (SCOT)

Zentral

Tier 2 Analyst Tools

Incident Response Resources

Incident Response Resources

CRITS

Fileintel

Gephi

Hostintel

Hindsight

Highlighter

Malstrom

Maltego

Timesketch

Threat Note

Copyright © 2023 Phenomenati - All Rights Reserved.


This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept