Resources:
(ISC)²'s Safe and Secure Online Program
Through the (ISC)² Safe and Secure Online Program, our member volunteers help children ages 11-14 learn how to protect
themselves online. With support from Childnet International, a UK-based charity that aims to make the Internet a safe place
for children, we began Safe and Secure Online in 2006 to address the gap in security advice that exists in children's safety
outreach efforts.
http://cyberexchange.isc2.org/safe-secure.aspx
United States Computer Emergency Readiness Team (CERT)
US-CERT is charged with providing response support and defense against cyber attacks for the Federal Civil Executive Branch
(.gov) and information sharing and collaboration with state and local government, industry and international partners. US-CERT
also provides a way for citizens, businesses, and other institutions to communicate and coordinate directly with the United States
government about cyber security.
https://www.us-cert.gov/
THREAT INTELLLIGENCE SOURCES
Public and Government Sources
Cisco Security Blog and RSS Feeds : https://tools.cisco.com/security/center/home.x
DarkReading.com : http://www.darkreading.com/
Defense Cyber Crime Center : http://www.dc3.mil/
Dell SecureWorks Blog: https://www.secureworks.com/blog
FBI : https://www.fbi.gov/about-us/investigate/cyber
Krebs On Security.com : http://www.krebsonsecurity.com/
Microsoft Cyber Trust Blog : https://blogs.microsoft.com/cybertrust/tag/threat-intelligence
OWASP :Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused
on improving the security of software https://www.owasp.org/index.php/OWASP_Automated_Threats_to_Web_Applications
SANS Internet Storm Center : https://isc.sans.edu/
ThreatBrief.com : http://threatbrief.com/
Curated Twitter feed : http://techbeacon.com/rsa-conference-top-25-infosec-leaders-follow-twitter
US Computer Emergency Response Team (US-CERT) : https://www.us-cert.gov/
Private Sources
Alert Logic : https://www.alertlogic.com/resources/threat-reports/
AlienVault : https://www.alienvault.com/products/threat-intelligence
Anomali : https://www.anomali.com/product/threatstream
CrowdStrike : https://www.crowdstrike.com/products/falcon-intelligence/
FireEye : https://www.fireeye.com/products/cyber-threat-intelligence.html
ISA Council - Information sharing and analysis centers (ISACs) are also a great source for threat intelligence. They are
sector-based, member-driven organizations that “collect, analyze and disseminate actionable threat information to their
members and provide members with tools to mitigate risks and enhance resiliency.” Find them all at www.isaccouncil.org
Qualys : https://www.qualys.com/suite/threatprotect/
Sage Data Security : https://www.sagedatasecurity.com/ndiscovery
HELPFUL RESOURCES FOR VICTIM BUSINESSES
Courtesy of Patrick Corbett, Assistant U.S. Attorney, Eastern District of Michigan
http://www.michigan.gov/msp/0,4643,7-123-72297_72370_72379---,00.html (Michigan State Police, Cyber Section)
http://www.ic3.gov/ (FBI Internet Crime Complaint Center)
https://www.fbi.gov/contact-us/field-offices/detroit (FBI-Detroit) www.cybercrime.gov (U.S. Department of Justice)
https://www.secretservice.gov/investigation/#field (U.S. Secret Service, Electronic Crimes Task Force) http://michiganinfragard.org/ (Michigan InfraGard – Public/Private Partnership)
https://htcia.org/ (High Tech Crime Investigations Association)
https://www.justice.gov/criminal-ccips/file/1096971/download (Best Practices for Victim Response and Reporting of Cyber Incidents, September 2018) https://www.justice.gov/criminal-ccips/file/872771/download (Protecting Your Network from Ransomware)
https://www.justice.gov/criminal-ccips/file/891011/download (Intellectual Property Victim Guide)
https://www.justice.gov/criminal-ccips/file/640271/download (Your Secrets Are Safe with Us: How Prosecutors Protect Trade Secrets During investigation and Prosecution)
https://www.us-cert.gov/sites/default/files/ais_files/CISA_FAQs.pdf (Cybersecurity Information Sharing Act – Frequently Asked Questions)
https://www.justice.gov/criminal-ccips/ccips-documents-and-reports (More Cyber Information)
http://www.identitytheft.gov (Federal Trade Commission, Identity Theft Site) (Spanish version - https://www.robodeidentidad.gov/ )
http://www.consumer.ftc.gov/features/feature-0014-identity-theft (Federal Trade Commission, Identity Theft Prevention Tips and Community Resources) http://www.usdoj.gov/criminal/fraud/websites/idtheft.html (United States Department of Justice)
http://www.dhs.gov/stopthinkconnect-campaign-blog (Department of Homeland Security Stop, Think, Connect Campaign Blog)
https://fas.org/sgp/crs/misc/R44101.pdf (CRS Report – Dark Web – Kristin Finklea, Specialist in Domestic Security, 3.10.17)