Resources:


 (ISC)²'s Safe and Secure Online Program 
Through the (ISC)² Safe and Secure Online Program, our member volunteers help children ages 11-14 learn how to protect
themselves online. With support from Childnet International, a UK-based charity that aims to make the Internet a safe place
for children, we began Safe and Secure Online in 2006 to address the gap in security advice that exists in children's safety
outreach efforts.

http://cyberexchange.isc2.org/safe-secure.aspx


​ United States Computer Emergency Readiness Team (CERT)
US-CERT is charged with providing response support and defense against cyber attacks for the Federal Civil Executive Branch
(.gov) and information sharing and collaboration with state and local government, industry and international partners. US-CERT
also provides a way for citizens, businesses, and other institutions to communicate and coordinate directly with the United States
government about cyber security. 


    https://www.us-cert.gov/



    THREAT INTELLLIGENCE SOURCES


              Public and Government Sources

 
     Cisco Security Blog and RSS Feeds : https://tools.cisco.com/security/center/home.x

     DarkReading.com : http://www.darkreading.com/

     Defense Cyber Crime Center : http://www.dc3.mil/

     Dell SecureWorks Blog: https://www.secureworks.com/blog

     FBI : https://www.fbi.gov/about-us/investigate/cyber

     Krebs On Security.com : http://www.krebsonsecurity.com/

     Microsoft Cyber Trust Blog : https://blogs.microsoft.com/cybertrust/tag/threat-intelligence

     OWASP :Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused

     on improving the security of software https://www.owasp.org/index.php/OWASP_Automated_Threats_to_Web_Applications

     SANS Internet Storm Center : https://isc.sans.edu/

     ThreatBrief.com :  http://threatbrief.com/

     Curated Twitter feed : http://techbeacon.com/rsa-conference-top-25-infosec-leaders-follow-twitter

     US Computer Emergency Response Team (US-CERT) : https://www.us-cert.gov/

 
                 Private Sources

     Alert Logic : https://www.alertlogic.com/resources/threat-reports/

     AlienVault : https://www.alienvault.com/products/threat-intelligence

     Anomali : https://www.anomali.com/product/threatstream

     CrowdStrike : https://www.crowdstrike.com/products/falcon-intelligence/

     FireEye : https://www.fireeye.com/products/cyber-threat-intelligence.html

     ISA Council - Information sharing and analysis centers (ISACs) are also a great source for threat intelligence.  They are

     sector-based, member-driven organizations that “collect, analyze and disseminate actionable threat information to their

     members and provide members with tools to mitigate risks and enhance resiliency.”  Find them all at www.isaccouncil.org

     Qualys : https://www.qualys.com/suite/threatprotect/

     Sage Data Security :  https://www.sagedatasecurity.com/ndiscovery





               HELPFUL RESOURCES FOR VICTIM BUSINESSES 


Courtesy of Patrick Corbett, Assistant U.S. Attorney, Eastern District of Michigan 



http://www.michigan.gov/msp/0,4643,7-123-72297_72370_72379---,00.html (Michigan State Police, Cyber Section)  
http://www.ic3.gov/ (FBI Internet Crime Complaint Center)  
https://www.fbi.gov/contact-us/field-offices/detroit (FBI-Detroit)  www.cybercrime.gov (U.S. Department of Justice)  
https://www.secretservice.gov/investigation/#field (U.S. Secret Service, Electronic Crimes Task Force)  http://michiganinfragard.org/ (Michigan InfraGard – Public/Private Partnership)  
https://htcia.org/ (High Tech Crime Investigations Association)  
https://www.justice.gov/criminal-ccips/file/1096971/download (Best Practices for Victim Response and Reporting of Cyber Incidents, September 2018)  https://www.justice.gov/criminal-ccips/file/872771/download (Protecting Your Network from Ransomware)  
https://www.justice.gov/criminal-ccips/file/891011/download (Intellectual Property Victim Guide)  
https://www.justice.gov/criminal-ccips/file/640271/download (Your Secrets Are Safe with Us: How Prosecutors Protect Trade Secrets During investigation and Prosecution)  
https://www.us-cert.gov/sites/default/files/ais_files/CISA_FAQs.pdf (Cybersecurity Information Sharing Act – Frequently Asked Questions)  
https://www.justice.gov/criminal-ccips/ccips-documents-and-reports (More Cyber Information)  
http://www.identitytheft.gov (Federal Trade Commission, Identity Theft Site) (Spanish version - https://www.robodeidentidad.gov/ )  
http://www.consumer.ftc.gov/features/feature-0014-identity-theft (Federal Trade Commission, Identity Theft Prevention Tips and Community Resources)  http://www.usdoj.gov/criminal/fraud/websites/idtheft.html (United States Department of Justice)  
http://www.dhs.gov/stopthinkconnect-campaign-blog (Department of Homeland Security Stop, Think, Connect Campaign Blog)  
https://fas.org/sgp/crs/misc/R44101.pdf (CRS Report – Dark Web – Kristin Finklea, Specialist in Domestic Security, 3.10.17)