CINXE.COM

Recommended Resources - Cyber Threat Alliance

<!doctype html> <html lang="en-US"> <head> <!-- Google Tag Manager --> <script nonce='9c2ee6cfeb'>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-T23SB83');</script> <!-- End Google Tag Manager --> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="apple-touch-icon" sizes="180x180" href="https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/resources/favicon/apple-touch-icon.png"> <link rel="icon" type="image/png" sizes="32x32" href="https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/resources/favicon/favicon-32x32.png"> <link rel="icon" type="image/png" sizes="16x16" href="https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/resources/favicon/favicon-16x16.png"> <link rel="manifest" href="https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/resources/favicon/site.webmanifest"> <link rel="mask-icon" href="https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/resources/favicon/safari-pinned-tab.svg" color="#5bbad5"> <meta name="msapplication-TileColor" content="#da532c"> <meta name="theme-color" content="#ffffff"> <script nonce='9c2ee6cfeb' type="text/javascript"> window.ajaxurl = 'https://www.cyberthreatalliance.org/wp-admin/admin-ajax.php'; window.homeurl = 'https://www.cyberthreatalliance.org/'; window.searchurl = 'https://www.cyberthreatalliance.org/?s='; </script> <meta name='robots' content='index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1' /> <style>img:is([sizes="auto" i], [sizes^="auto," i]) { contain-intrinsic-size: 3000px 1500px }</style> <!-- This site is optimized with the Yoast SEO plugin v23.7 - https://yoast.com/wordpress/plugins/seo/ --> <title>Recommended Resources - Cyber Threat Alliance</title> <meta name="description" content="The Cyber Threat Alliance (CTA) is a group of cybersecurity practitioners from organizations that have chosen to work together in good faith to share threat information for the purpose of improving defenses against advanced cyber adversaries across member organizations and their customers." /> <link rel="canonical" href="https://www.cyberthreatalliance.org/resources/recommended-resources/" /> <meta property="og:locale" content="en_US" /> <meta property="og:type" content="article" /> <meta property="og:title" content="Recommended Resources - Cyber Threat Alliance" /> <meta property="og:description" content="The Cyber Threat Alliance (CTA) is a group of cybersecurity practitioners from organizations that have chosen to work together in good faith to share threat information for the purpose of improving defenses against advanced cyber adversaries across member organizations and their customers." /> <meta property="og:url" content="https://www.cyberthreatalliance.org/resources/recommended-resources/" /> <meta property="og:site_name" content="Cyber Threat Alliance" /> <meta property="article:modified_time" content="2023-01-30T21:24:29+00:00" /> <meta name="twitter:card" content="summary_large_image" /> <script type="application/ld+json" class="yoast-schema-graph">{"@context":"https://schema.org","@graph":[{"@type":"WebPage","@id":"https://www.cyberthreatalliance.org/resources/recommended-resources/","url":"https://www.cyberthreatalliance.org/resources/recommended-resources/","name":"Recommended Resources - Cyber Threat Alliance","isPartOf":{"@id":"https://www.cyberthreatalliance.org/#website"},"datePublished":"2023-01-30T21:24:28+00:00","dateModified":"2023-01-30T21:24:29+00:00","description":"The Cyber Threat Alliance (CTA) is a group of cybersecurity practitioners from organizations that have chosen to work together in good faith to share threat information for the purpose of improving defenses against advanced cyber adversaries across member organizations and their customers.","breadcrumb":{"@id":"https://www.cyberthreatalliance.org/resources/recommended-resources/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https://www.cyberthreatalliance.org/resources/recommended-resources/"]}]},{"@type":"BreadcrumbList","@id":"https://www.cyberthreatalliance.org/resources/recommended-resources/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://www.cyberthreatalliance.org/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https://www.cyberthreatalliance.org/resources/"},{"@type":"ListItem","position":3,"name":"Recommended Resources"}]},{"@type":"WebSite","@id":"https://www.cyberthreatalliance.org/#website","url":"https://www.cyberthreatalliance.org/","name":"Cyber Threat Alliance","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https://www.cyberthreatalliance.org/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}</script> <!-- / Yoast SEO plugin. --> <link rel='stylesheet' id='wp-block-library-css' href='https://www.cyberthreatalliance.org/wp-includes/css/dist/block-library/style.min.css' media='all' /> <style id='wp-block-library-theme-inline-css'> .wp-block-audio :where(figcaption){color:#555;font-size:13px;text-align:center}.is-dark-theme .wp-block-audio :where(figcaption){color:#ffffffa6}.wp-block-audio{margin:0 0 1em}.wp-block-code{border:1px solid #ccc;border-radius:4px;font-family:Menlo,Consolas,monaco,monospace;padding:.8em 1em}.wp-block-embed :where(figcaption){color:#555;font-size:13px;text-align:center}.is-dark-theme .wp-block-embed :where(figcaption){color:#ffffffa6}.wp-block-embed{margin:0 0 1em}.blocks-gallery-caption{color:#555;font-size:13px;text-align:center}.is-dark-theme .blocks-gallery-caption{color:#ffffffa6}:root :where(.wp-block-image figcaption){color:#555;font-size:13px;text-align:center}.is-dark-theme :root :where(.wp-block-image figcaption){color:#ffffffa6}.wp-block-image{margin:0 0 1em}.wp-block-pullquote{border-bottom:4px solid;border-top:4px solid;color:currentColor;margin-bottom:1.75em}.wp-block-pullquote cite,.wp-block-pullquote footer,.wp-block-pullquote__citation{color:currentColor;font-size:.8125em;font-style:normal;text-transform:uppercase}.wp-block-quote{border-left:.25em solid;margin:0 0 1.75em;padding-left:1em}.wp-block-quote cite,.wp-block-quote footer{color:currentColor;font-size:.8125em;font-style:normal;position:relative}.wp-block-quote:where(.has-text-align-right){border-left:none;border-right:.25em solid;padding-left:0;padding-right:1em}.wp-block-quote:where(.has-text-align-center){border:none;padding-left:0}.wp-block-quote.is-large,.wp-block-quote.is-style-large,.wp-block-quote:where(.is-style-plain){border:none}.wp-block-search .wp-block-search__label{font-weight:700}.wp-block-search__button{border:1px solid #ccc;padding:.375em .625em}:where(.wp-block-group.has-background){padding:1.25em 2.375em}.wp-block-separator.has-css-opacity{opacity:.4}.wp-block-separator{border:none;border-bottom:2px solid;margin-left:auto;margin-right:auto}.wp-block-separator.has-alpha-channel-opacity{opacity:1}.wp-block-separator:not(.is-style-wide):not(.is-style-dots){width:100px}.wp-block-separator.has-background:not(.is-style-dots){border-bottom:none;height:1px}.wp-block-separator.has-background:not(.is-style-wide):not(.is-style-dots){height:2px}.wp-block-table{margin:0 0 1em}.wp-block-table td,.wp-block-table th{word-break:normal}.wp-block-table :where(figcaption){color:#555;font-size:13px;text-align:center}.is-dark-theme .wp-block-table :where(figcaption){color:#ffffffa6}.wp-block-video :where(figcaption){color:#555;font-size:13px;text-align:center}.is-dark-theme .wp-block-video :where(figcaption){color:#ffffffa6}.wp-block-video{margin:0 0 1em}:root :where(.wp-block-template-part.has-background){margin-bottom:0;margin-top:0;padding:1.25em 2.375em} </style> <style id='global-styles-inline-css'> :root{--wp--preset--aspect-ratio--square: 1;--wp--preset--aspect-ratio--4-3: 4/3;--wp--preset--aspect-ratio--3-4: 3/4;--wp--preset--aspect-ratio--3-2: 3/2;--wp--preset--aspect-ratio--2-3: 2/3;--wp--preset--aspect-ratio--16-9: 16/9;--wp--preset--aspect-ratio--9-16: 9/16;--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #ffffff;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--color--base: #ffffff;--wp--preset--color--contrast: #000000;--wp--preset--color--primary: #f26722;--wp--preset--color--secondary: #191e4b;--wp--preset--color--tertiary: #6e6f72;--wp--preset--color--quaternary: #3CAB6C;--wp--preset--color--light-gray: #ccc;--wp--preset--color--lighter-gray: #eee;--wp--preset--color--dark-gray: #333;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.469), 20px);--wp--preset--font-size--large: clamp(22.041px, 1.378rem + ((1vw - 3.2px) * 1.091), 36px);--wp--preset--font-size--x-large: clamp(25.014px, 1.563rem + ((1vw - 3.2px) * 1.327), 42px);--wp--preset--font-family--roboto: "Roboto", sans-serif;--wp--preset--font-family--roboto-condensed: "Roboto Condensed", sans-serif;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);--wp--custom--spacing--padded: clamp(1.5rem, 2.5vw, 2rem);}:root { --wp--style--global--content-size: var(--breakpoint-large);--wp--style--global--wide-size: var(--breakpoint-xlarge); }:where(body) { margin: 0; }.wp-site-blocks { padding-top: var(--wp--style--root--padding-top); padding-bottom: var(--wp--style--root--padding-bottom); }.has-global-padding { padding-right: var(--wp--style--root--padding-right); padding-left: var(--wp--style--root--padding-left); }.has-global-padding > .alignfull { margin-right: calc(var(--wp--style--root--padding-right) * -1); margin-left: calc(var(--wp--style--root--padding-left) * -1); }.has-global-padding :where(:not(.alignfull.is-layout-flow) > .has-global-padding:not(.wp-block-block, .alignfull)) { padding-right: 0; padding-left: 0; }.has-global-padding :where(:not(.alignfull.is-layout-flow) > .has-global-padding:not(.wp-block-block, .alignfull)) > .alignfull { margin-left: 0; margin-right: 0; }.wp-site-blocks > .alignleft { float: left; margin-right: 2em; }.wp-site-blocks > .alignright { float: right; margin-left: 2em; }.wp-site-blocks > .aligncenter { justify-content: center; margin-left: auto; margin-right: auto; }:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}.is-layout-flow > .alignleft{float: left;margin-inline-start: 0;margin-inline-end: 2em;}.is-layout-flow > .alignright{float: right;margin-inline-start: 2em;margin-inline-end: 0;}.is-layout-flow > .aligncenter{margin-left: auto !important;margin-right: auto !important;}.is-layout-constrained > .alignleft{float: left;margin-inline-start: 0;margin-inline-end: 2em;}.is-layout-constrained > .alignright{float: right;margin-inline-start: 2em;margin-inline-end: 0;}.is-layout-constrained > .aligncenter{margin-left: auto !important;margin-right: auto !important;}.is-layout-constrained > :where(:not(.alignleft):not(.alignright):not(.alignfull)){max-width: var(--wp--style--global--content-size);margin-left: auto !important;margin-right: auto !important;}.is-layout-constrained > .alignwide{max-width: var(--wp--style--global--wide-size);}body .is-layout-flex{display: flex;}.is-layout-flex{flex-wrap: wrap;align-items: center;}.is-layout-flex > :is(*, div){margin: 0;}body .is-layout-grid{display: grid;}.is-layout-grid > :is(*, div){margin: 0;}body{font-family: var(--wp--preset--font-family--roboto);line-height: 1.6;--wp--style--root--padding-top: var(--wp--preset--spacing--40);--wp--style--root--padding-right: var(--wp--preset--spacing--60);--wp--style--root--padding-bottom: var(--wp--preset--spacing--40);--wp--style--root--padding-left: var(--wp--preset--spacing--60);}a:where(:not(.wp-element-button)){text-decoration: underline;}h3{font-family: var(--wp--preset--font-family--roboto-condensed);font-weight: 300;}:root :where(.wp-element-button, .wp-block-button__link){background-color: #32373c;border-width: 0;color: #fff;font-family: inherit;font-size: inherit;font-weight: 700;line-height: inherit;padding: calc(0.667em + 2px) calc(1.333em + 2px);text-decoration: none;text-transform: uppercase;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-base-color{color: var(--wp--preset--color--base) !important;}.has-contrast-color{color: var(--wp--preset--color--contrast) !important;}.has-primary-color{color: var(--wp--preset--color--primary) !important;}.has-secondary-color{color: var(--wp--preset--color--secondary) !important;}.has-tertiary-color{color: var(--wp--preset--color--tertiary) !important;}.has-quaternary-color{color: var(--wp--preset--color--quaternary) !important;}.has-light-gray-color{color: var(--wp--preset--color--light-gray) !important;}.has-lighter-gray-color{color: var(--wp--preset--color--lighter-gray) !important;}.has-dark-gray-color{color: var(--wp--preset--color--dark-gray) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-base-background-color{background-color: var(--wp--preset--color--base) !important;}.has-contrast-background-color{background-color: var(--wp--preset--color--contrast) !important;}.has-primary-background-color{background-color: var(--wp--preset--color--primary) !important;}.has-secondary-background-color{background-color: var(--wp--preset--color--secondary) !important;}.has-tertiary-background-color{background-color: var(--wp--preset--color--tertiary) !important;}.has-quaternary-background-color{background-color: var(--wp--preset--color--quaternary) !important;}.has-light-gray-background-color{background-color: var(--wp--preset--color--light-gray) !important;}.has-lighter-gray-background-color{background-color: var(--wp--preset--color--lighter-gray) !important;}.has-dark-gray-background-color{background-color: var(--wp--preset--color--dark-gray) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-base-border-color{border-color: var(--wp--preset--color--base) !important;}.has-contrast-border-color{border-color: var(--wp--preset--color--contrast) !important;}.has-primary-border-color{border-color: var(--wp--preset--color--primary) !important;}.has-secondary-border-color{border-color: var(--wp--preset--color--secondary) !important;}.has-tertiary-border-color{border-color: var(--wp--preset--color--tertiary) !important;}.has-quaternary-border-color{border-color: var(--wp--preset--color--quaternary) !important;}.has-light-gray-border-color{border-color: var(--wp--preset--color--light-gray) !important;}.has-lighter-gray-border-color{border-color: var(--wp--preset--color--lighter-gray) !important;}.has-dark-gray-border-color{border-color: var(--wp--preset--color--dark-gray) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;}.has-roboto-font-family{font-family: var(--wp--preset--font-family--roboto) !important;}.has-roboto-condensed-font-family{font-family: var(--wp--preset--font-family--roboto-condensed) !important;} :root :where(.wp-block-button .wp-block-button__link){border-radius: 1em;border-color: transparent;border-width: 0;border-style: solid;} :where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;} :where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;} :root :where(.wp-block-pullquote){font-size: clamp(0.984em, 0.984rem + ((1vw - 0.2em) * 0.645), 1.5em);line-height: 1.6;} :root :where(.wp-block-heading){font-family: var(--wp--preset--font-family--roboto-condensed);font-weight: 300;} :root :where(.wp-block-cover){padding-top: var(--spacing);padding-right: var(--spacing);padding-bottom: var(--spacing);padding-left: var(--spacing);} :root :where(.wp-block-cover h2){font-family: var(--wp--preset--font-family--roboto-condensed);font-size: var(--step-4);font-style: normal;font-weight: 700;line-height: 1.2;margin-top: 0;margin-bottom: 0;} :root :where(.wp-block-cover h3){font-family: var(--wp--preset--font-family--roboto-condensed);font-size: clamp(1.25rem, 1.25rem + ((1vw - 0.2rem) * 0.938), 2rem);font-weight: 700;margin-top: 0;margin-bottom: 0;text-transform: uppercase;} :root :where(.wp-block-buttons){margin-top: var(--spacing);margin-bottom: var(--spacing);} </style> <link rel='stylesheet' id='app/0-css' href='https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/public/css/app.d8de28.css' media='all' /> <link rel="https://api.w.org/" href="https://www.cyberthreatalliance.org/wp-json/" /><link rel="alternate" title="JSON" type="application/json" href="https://www.cyberthreatalliance.org/wp-json/wp/v2/pages/8209" /><link rel="EditURI" type="application/rsd+xml" title="RSD" href="https://www.cyberthreatalliance.org/xmlrpc.php?rsd" /> <meta name="generator" content="WordPress 6.7.1" /> <link rel='shortlink' href='https://www.cyberthreatalliance.org/?p=8209' /> <link rel="alternate" title="oEmbed (JSON)" type="application/json+oembed" href="https://www.cyberthreatalliance.org/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.cyberthreatalliance.org%2Fresources%2Frecommended-resources%2F" /> <link rel="alternate" title="oEmbed (XML)" type="text/xml+oembed" href="https://www.cyberthreatalliance.org/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.cyberthreatalliance.org%2Fresources%2Frecommended-resources%2F&#038;format=xml" /> <style class='wp-fonts-local'> @font-face{font-family:Roboto;font-style:normal;font-weight:400;font-display:fallback;src:url('https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/resources/fonts/roboto/roboto-regular.woff2') format('woff2');font-stretch:normal;} @font-face{font-family:Roboto;font-style:italic;font-weight:400;font-display:fallback;src:url('https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/resources/fonts/roboto/roboto-italic.woff2') format('woff2');font-stretch:normal;} @font-face{font-family:Roboto;font-style:normal;font-weight:700;font-display:fallback;src:url('https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/resources/fonts/roboto/roboto-700.woff2') format('woff2');font-stretch:normal;} @font-face{font-family:Roboto;font-style:italic;font-weight:700;font-display:fallback;src:url('https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/resources/fonts/roboto/roboto-700italic.woff2') format('woff2');font-stretch:normal;} @font-face{font-family:"Roboto Condensed";font-style:normal;font-weight:300;font-display:fallback;src:url('https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/resources/fonts/roboto-condensed/roboto-condensed-300.woff2') format('woff2');font-stretch:normal;} @font-face{font-family:"Roboto Condensed";font-style:normal;font-weight:700;font-display:fallback;src:url('https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/resources/fonts/roboto-condensed/roboto-condensed-700.woff2') format('woff2');font-stretch:normal;} </style> </head> <body class="page-template page-template-template-resources page-template-template-resources-php page page-id-8209 page-child parent-pageid-8026 wp-embed-responsive recommended-resources"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-T23SB83" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <div id="app"> <a class="skip-to-content" href="#content">Skip to content</a> <div class="site-wrapper"> <header class="header wrapper " role="banner" itemscope itemtype="http://schema.org/WPHeader"> <div class="header__logo-navigation wrapper__inner wrapper__inner--xxlarge"> <div class="logo" itemscope itemtype="http://schema.org/Organization"> <a href="https://www.cyberthreatalliance.org"> <svg xmlns="http://www.w3.org/2000/svg" width="305" height="45" viewBox="0 0 305.5 45.4"><defs><style>.b-ct,.c-ct{fill:#f26722;}.d-ct{fill:#fff;}.e-ct{fill:#6e6f72;}.e-ct,.c-ct{fill-rule:evenodd;}</style></defs><path class="b-ct" d="m69,24.3c0,1.7-.4,2.9-1.5,3.9-1.17.98-2.67,1.49-4.2,1.4-1.8,0-3.3-.6-4.4-1.7s-1.6-2.7-1.6-4.5v-3c0-1.8.5-3.3,1.6-4.5,1.11-1.18,2.68-1.81,4.3-1.7,1.8,0,3.3.5,4.3,1.4,1,.9,1.5,2.2,1.5,3.9v.1h-2.9c0-1-.2-1.7-.7-2.3-.5-.5-1.2-.7-2.2-.7-.9,0-1.6.3-2.2,1.1s-.8,1.6-.8,2.7v3c0,1.1.3,2.1.8,2.8s1.3,1.1,2.2,1.1,1.6-.3,2.1-.8c.4-.5.7-1.2.7-2.2,0,0,3,0,3,0Zm7.3-2.9l3.3-6.9h3.3l-5.1,9.7v5.2h-3v-5.4l-5-9.5h3.3l3.2,6.9Zm8.1,8v-14.9h5c1.8,0,3.1.3,4.1,1s1.5,1.7,1.5,3.1c0,.7-.2,1.3-.5,1.9-.4.5-.9,1-1.6,1.2.9.2,1.6.6,2,1.2s.7,1.4.7,2.2c0,1.4-.5,2.5-1.4,3.2s-2.3,1.1-4,1.1c0,0-5.8,0-5.8,0Zm3-8.7h2.2c.8,0,1.4-.2,1.8-.5s.6-.8.6-1.4c0-.7-.2-1.2-.7-1.5-.4-.3-1.1-.5-1.9-.5h-2.1v3.9h.1Zm0,2.1v4.3h2.8c.64.03,1.27-.15,1.8-.5.4-.3.6-.9.6-1.5,0-.7-.2-1.3-.5-1.7s-.9-.6-1.7-.6c0,0-3,0-3,0Zm19.6,0h-6.2v4.3h7.2v2.3h-10.2v-14.9h10.2v2.3h-7.2v3.8h6.2v2.2Zm5.9.6v6h-3v-14.9h5.6c1.7,0,3,.4,4,1.2s1.4,1.9,1.4,3.2c0,.8-.2,1.4-.6,2s-1,1-1.8,1.3c.9.3,1.5.7,1.9,1.3.4.6.6,1.4.6,2.3v1.1l.2,1.3c.1.5.3.8.6,1v.2h-3.1c-.3-.2-.5-.6-.5-1.1l-.1-1.5v-1.1c0-.7-.2-1.3-.6-1.7-.4-.4-1-.6-1.7-.6,0,0-2.9,0-2.9,0Zm0-2.3h2.6c.8,0,1.5-.2,1.9-.5.4-.4.6-.9.6-1.6s-.2-1.2-.6-1.6c-.4-.4-1-.6-1.8-.6h-2.6v4.3h-.1Zm26.4-4.3h-4.2v12.6h-3v-12.6h-4.2v-2.3h11.4v2.3Zm13.8,12.6h-3v-6.2h-6.1v6.2h-3v-14.9h3v6.4h6.1v-6.4h3v14.9Zm5.8-6v6h-3v-14.9h5.6c1.7,0,3,.4,4,1.2s1.4,1.9,1.4,3.2c0,.8-.2,1.4-.6,2s-1,1-1.8,1.3c.9.3,1.5.7,1.9,1.3s.6,1.4.6,2.3v1.1l.2,1.3c.1.5.3.8.6,1v.2h-3.1c-.3-.2-.5-.6-.5-1.1l-.1-1.5v-1.1c0-.7-.2-1.3-.6-1.7s-1-.6-1.7-.6c0,0-2.9,0-2.9,0Zm0-2.3h2.6c.8,0,1.5-.2,1.9-.5.4-.4.6-.9.6-1.6s-.2-1.2-.6-1.6-1-.6-1.8-.6h-2.6v4.3h-.1Zm20,1.7h-6.2v4.3h7.2v2.3h-10.2v-14.9h10.2v2.3h-7.2v3.8h6.2v2.2Zm10.9,3.4h-5.2l-1,3.2h-3l5.1-14.9h3.1l5.1,14.9h-3l-1.1-3.2h0Zm-4.5-2.4h3.8l-1.8-5.9h-.1l-1.9,5.9Zm20.3-7h-4.3v12.6h-3v-12.6h-4.2v-2.3h11.4v2.3h.1Z"/><path class="d-ct" d="m219.2,26.2h-5.2l-1,3.2h-3l5.1-14.9h3.1l5.1,14.9h-3l-1.1-3.2Zm-4.5-2.4h3.8l-1.8-5.9h-.1l-1.9,5.9Zm12.9,3.3h6.6v2.3h-9.6v-14.9h3v12.6Zm11.4,0h6.6v2.3h-9.6v-14.9h3v12.6Zm11.5,2.3h-3v-14.9h3v14.9Zm11-3.2h-5.2l-1,3.2h-3l5.1-14.9h3.1l5.1,14.9h-3l-1.1-3.2h0Zm-4.5-2.4h3.8l-1.8-5.9h-.1l-1.9,5.9Zm22,5.6h-3l-6-10.2h-.1v10.2h-3v-14.9h3l6,10.2h.1v-10.2h3v14.9Zm14.1-5.1c0,1.7-.4,2.9-1.5,3.9-1.17.98-2.67,1.49-4.2,1.4-1.8,0-3.3-.6-4.4-1.7s-1.7-2.6-1.7-4.5v-3c0-1.8.5-3.3,1.6-4.5,1.11-1.18,2.68-1.81,4.3-1.7,1.8,0,3.3.5,4.3,1.4,1,.9,1.5,2.2,1.5,3.9v.1h-2.9c0-1-.2-1.7-.7-2.3-.59-.55-1.39-.84-2.2-.8-.9,0-1.6.4-2.1,1.1s-.8,1.7-.8,2.8v3c0,1.1.3,2.1.8,2.8s1.3,1.1,2.2,1.1,1.6-.3,2.1-.8c.4-.5.7-1.2.7-2.2h3,0Zm11.3-1.5h-6.1v4.3h7.2v2.3h-10.2v-14.9h10.2v2.3h-7.2v3.8h6.2v2.2h-.1Z"/><path class="e-ct" d="m17,39.5l6.6,5.9,21.7-23-15.7-15.4-5.5,5.9,8.9,9.5-16,17.1Z"/><path class="c-ct" d="m28.3,5.9L21.8,0,0,23l15.8,15.4,5.4-5.9-8.9-9.5L28.3,5.9Z"/></svg> <span class="screen-reader-text">Cyber Threat Alliance</span> </a> </div> <div class="navigation navigation-main"> <div class="navigation__button__wrap"> <button class="navigation__toggle" data-menu=".navigation__list"> <span class="screen-reader-text">Menu</span> <svg aria-hidden="true" viewBox="0 0 128 128" width="30" height="30"><path class="icon-nav-bar icon-nav-top" d="M0 0h128v27H0z"/><path class="icon-nav-bar icon-nav-middle" d="M0 50.5h128v27H0z"/><path class="icon-nav-bar icon-nav-bottom" d="M0 101h128v27H0z"/></svg> </button> </div> <nav id="navigation-main" class="navigation__list" aria-label="Main" itemscope itemtype="http://schema.org/SiteNavigationElement"> <ul > <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-7941 menu-item-has-children"> <a href="https://www.cyberthreatalliance.org/about/">About CTA</a> <button class="showsubmenu"><span class="screen-reader-text">Show Submenu</span>+</button> <ul class="sub-menu"> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-7942"> <a href="https://www.cyberthreatalliance.org/about/who-we-are/">Who We Are</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8091"> <a href="https://www.cyberthreatalliance.org/about/board-of-directors/">Board of Directors</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8099"> <a href="https://www.cyberthreatalliance.org/about/our-sharing-model/">Our Sharing Model</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8199"> <a href="https://www.cyberthreatalliance.org/about/testimonials/">Testimonials</a> </li> </ul> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8236"> <a href="https://www.cyberthreatalliance.org/membership/">Membership</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8042"> <a href="https://www.cyberthreatalliance.org/partnerships/">Partnerships</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8128"> <a href="https://www.cyberthreatalliance.org/news/">News</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8127"> <a href="https://www.cyberthreatalliance.org/events/">Events</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page current-page-ancestor current-menu-ancestor current-menu-parent current-page-parent current_page_parent current_page_ancestor menu-item-8033 menu-item-has-children"> <a href="https://www.cyberthreatalliance.org/resources/">Resources</a> <button class="showsubmenu"><span class="screen-reader-text">Show Submenu</span>+</button> <ul class="sub-menu"> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8144"> <a href="https://www.cyberthreatalliance.org/resources/assets/">Assets</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8393"> <a href="https://www.cyberthreatalliance.org/resources/webinars/">Webinars</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page current-menu-item page_item page-item-8209 current_page_item menu-item-8213"> <a href="https://www.cyberthreatalliance.org/resources/recommended-resources/">Recommended Resources</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8143"> <a href="https://www.cyberthreatalliance.org/member-shares/">Member Shares</a> </li> </ul> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-7993"> <a href="https://www.cyberthreatalliance.org/blog/">Blog</a> </li> </ul> </nav> <div class="navigation__search"> <div class="menu-search-button"> <a id="menu-search-button" href="#"> <span class="screen-reader-text">Search</span> <svg aria-hidden="true" xmlns="http://www.w3.org/2000/svg" width="13" height="13" viewBox="0 0 13 13"><path d="M4.5,9A4.5,4.5,0,1,1,9,4.5,4.505,4.505,0,0,1,4.5,9Zm0-7A2.5,2.5,0,1,0,7,4.5,2.503,2.503,0,0,0,4.5,2Z" fill="#fff"/><path d="M12,13a.9967.9967,0,0,1-.707-.293l-3.5-3.5A1,1,0,1,1,9.207,7.793l3.5,3.5A1,1,0,0,1,12,13Z" fill="#fff"/></svg> </a> </div> <div class="menu-search" id="menu-search"> <form action="https://www.cyberthreatalliance.org" method="get"> <label for="menu-search-field" class="screen-reader-text">Search</label> <input type="text" name="s" id="menu-search-field"> </form> </div> </div> </div> </div> </header> <div class="wrapper page-header__wrapper is-layout-constrained wp-block-group alignfull is-style-padded"> <div class="page-header wrapper__inner is-layout-flow wp-block-group alignwide"> <h1 class="page-header-title"> Recommended Resources </h1> <div class="breadcrumbs"> <span><span><a href="https://www.cyberthreatalliance.org/">Home</a></span> » <span><a href="https://www.cyberthreatalliance.org/resources/">Resources</a></span> » <span class="breadcrumb_last" aria-current="page">Recommended Resources</span></span> </div> </div> </div> <section id="content" role="main" class="wrapper content__wrapper"> <div class="wrapper__inner wrapper__inner--nopadding is-layout-constrained has-global-padding"> <div class="assets__wrapper" id="assets"> <div class="assets__list"> <article class="asset__listitem post-listitem-post animate" id="post-listitem-9671"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/act-launches-the-threat-taming-tool-collection/" aria-label="ACT Launches the Threat Taming Tool Collection"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2024/08/ACT-Launches-the-Threat-Taming-Tool-Collection-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2024/08/ACT-Launches-the-Threat-Taming-Tool-Collection-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2024/08/ACT-Launches-the-Threat-Taming-Tool-Collection-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/act-launches-the-threat-taming-tool-collection/">ACT Launches the Threat Taming Tool Collection</a></h3> </div> </article> <article class="asset__listitem post-listitem-post animate" id="post-listitem-9467"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/cyber-threats-to-ngos-recommended-resources/" aria-label="Cyber Threats to NGOs &#8211; Recommended Resources"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2024/04/Cyber-Threats-to-NGOs_resources-cover-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2024/04/Cyber-Threats-to-NGOs_resources-cover-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2024/04/Cyber-Threats-to-NGOs_resources-cover-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/cyber-threats-to-ngos-recommended-resources/">Cyber Threats to NGOs &#8211; Recommended Resources</a></h3> </div> </article> <article class="asset__listitem post-listitem-post animate" id="post-listitem-9367"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/the-fundamentals-of-cyber-risk-management/" aria-label="The Fundamentals of Cyber Risk Management"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2024/02/The-Fundamentals-of-Cyber-Risk-Management_Page_01-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2024/02/The-Fundamentals-of-Cyber-Risk-Management_Page_01-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2024/02/The-Fundamentals-of-Cyber-Risk-Management_Page_01-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/the-fundamentals-of-cyber-risk-management/">The Fundamentals of Cyber Risk Management</a></h3> </div> </article> <article class="asset__listitem post-listitem-post animate" id="post-listitem-9212"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/new-york-cyber-task-force-3-0-bridging-the-trust-gap/" aria-label="NEW YORK CYBER TASK FORCE 3.0 – Bridging the Trust Gap"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2023/11/CTA_Bridging-the-Trust-Gap-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2023/11/CTA_Bridging-the-Trust-Gap-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2023/11/CTA_Bridging-the-Trust-Gap-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/new-york-cyber-task-force-3-0-bridging-the-trust-gap/">NEW YORK CYBER TASK FORCE 3.0 – Bridging the Trust Gap</a></h3> </div> </article> <article class="asset__listitem post-listitem-post animate" id="post-listitem-8980"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/scaling-trust-on-the-web/" aria-label="SCALING TRUST ON THE WEB"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2023/07/Screenshot-2023-07-05-155256-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2023/07/Screenshot-2023-07-05-155256-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2023/07/Screenshot-2023-07-05-155256-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/scaling-trust-on-the-web/">SCALING TRUST ON THE WEB</a></h3> </div> </article> <article class="asset__listitem post-listitem-post animate" id="post-listitem-7310"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/systemic-cybersecurity-risk-and-role-of-the-global-community-managing-the-unmanageable/" aria-label="Systemic Cybersecurity Risk and role of the Global Community: Managing the Unmanageable"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2022/11/Systemic-Cybersecurity-Risk-WEF-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2022/11/Systemic-Cybersecurity-Risk-WEF-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2022/11/Systemic-Cybersecurity-Risk-WEF-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/systemic-cybersecurity-risk-and-role-of-the-global-community-managing-the-unmanageable/">Systemic Cybersecurity Risk and role of the Global Community: Managing the Unmanageable</a></h3> </div> </article> <article class="asset__listitem post-listitem-post animate" id="post-listitem-7288"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/preparing-for-new-incident-reporting-requirements/" aria-label="Preparing for New Incident Reporting Requirements"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2022/11/Preparing-for-New-Incident-Reporting-Requirements-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2022/11/Preparing-for-New-Incident-Reporting-Requirements-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2022/11/Preparing-for-New-Incident-Reporting-Requirements-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/preparing-for-new-incident-reporting-requirements/">Preparing for New Incident Reporting Requirements</a></h3> </div> </article> <article class="asset__listitem post-listitem-post animate" id="post-listitem-6492"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/an-update-on-the-state-of-the-secs-approach-to-cyber-risk/" aria-label="An Update on the State of the SEC’s Approach to Cyber Risk"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2022/06/SEC-Cyber-Risk-1-443x576-c-default.jpg" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2022/06/SEC-Cyber-Risk-1-443x576-c-default.jpg 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2022/06/SEC-Cyber-Risk-1-640x832-c-default.jpg 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/an-update-on-the-state-of-the-secs-approach-to-cyber-risk/">An Update on the State of the SEC’s Approach to Cyber Risk</a></h3> </div> </article> <article class="asset__listitem post-listitem-post animate" id="post-listitem-7283"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/adjusting-to-a-new-era-in-ransomware-risk/" aria-label="Adjusting to a New Era in Ransomware Risk"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2022/04/Adjusting-to-a-New-Era-in-Ransomware-Risk-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2022/04/Adjusting-to-a-New-Era-in-Ransomware-Risk-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2022/04/Adjusting-to-a-New-Era-in-Ransomware-Risk-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/adjusting-to-a-new-era-in-ransomware-risk/">Adjusting to a New Era in Ransomware Risk</a></h3> </div> </article> <article class="asset__listitem post-listitem-post animate" id="post-listitem-3815"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/institute-for-security-and-technology-ransomware-task-force-report/" aria-label="Institute for Security and Technology &#8211; Ransomware Task Force Report"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2021/04/RTF-Report-e1654787557526-1-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2021/04/RTF-Report-e1654787557526-1-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2021/04/RTF-Report-e1654787557526-1-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/institute-for-security-and-technology-ransomware-task-force-report/">Institute for Security and Technology &#8211; Ransomware Task Force Report</a></h3> </div> </article> <article class="asset__listitem post-listitem-post animate" id="post-listitem-3621"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/the-state-of-cyber-risk-disclosures-of-public-companies/" aria-label="The State of Cyber-Risk Disclosures of Public Companies"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2021/03/cyber-risk-disclosures-of-public-companies-1-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2021/03/cyber-risk-disclosures-of-public-companies-1-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2021/03/cyber-risk-disclosures-of-public-companies-1-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/the-state-of-cyber-risk-disclosures-of-public-companies/">The State of Cyber-Risk Disclosures of Public Companies</a></h3> </div> </article> <article class="asset__listitem post-listitem-post animate" id="post-listitem-1961"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/crosswalk-from-nsa-cyber-threat-framework-to-the-mitre-attck-framework/" aria-label="Crosswalk from NSA Cyber Threat Framework to the MITRE ATT&#038;CK Framework"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2020/02/Cyber-Threat-Attribution-Lexicon-443x576-c-default.jpg" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2020/02/Cyber-Threat-Attribution-Lexicon-443x576-c-default.jpg 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2020/02/Cyber-Threat-Attribution-Lexicon-640x832-c-default.jpg 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/crosswalk-from-nsa-cyber-threat-framework-to-the-mitre-attck-framework/">Crosswalk from NSA Cyber Threat Framework to the MITRE ATT&#038;CK Framework</a></h3> </div> </article> <article class="asset__listitem post-listitem-post animate" id="post-listitem-1263"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/next-steps-in-playbook-driven-cyber-security/" aria-label="Next Steps in Playbook Driven Cyber Security"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2019/10/HardenStance-White-Paper-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2019/10/HardenStance-White-Paper-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2019/10/HardenStance-White-Paper-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/next-steps-in-playbook-driven-cyber-security/">Next Steps in Playbook Driven Cyber Security</a></h3> </div> </article> <article class="asset__listitem post-listitem-post animate" id="post-listitem-951"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/aspen-cybersecurity-group-operational-collaboration-framework/" aria-label="Aspen Cybersecurity Group: An Operational Collaboration Framework"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2018/11/Aspen-Cybersecurity-Group-443x576-c-default.jpg" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2018/11/Aspen-Cybersecurity-Group-443x576-c-default.jpg 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2018/11/Aspen-Cybersecurity-Group-640x832-c-default.jpg 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/aspen-cybersecurity-group-operational-collaboration-framework/">Aspen Cybersecurity Group: An Operational Collaboration Framework</a></h3> </div> </article> <article class="asset__listitem post-listitem-post animate" id="post-listitem-789"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/2018-cmo-cybersecurity-survey-key-findings/" aria-label="2018 CMO Cybersecurity Survey Key Findings"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2018/06/Screen-Shot-2018-06-25-at-4.25.56-PM-443x576-c-default.png" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2018/06/Screen-Shot-2018-06-25-at-4.25.56-PM-443x576-c-default.png 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2018/06/Screen-Shot-2018-06-25-at-4.25.56-PM-640x832-c-default.png 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/2018-cmo-cybersecurity-survey-key-findings/">2018 CMO Cybersecurity Survey Key Findings</a></h3> </div> </article> <article class="asset__listitem post-listitem-post animate" id="post-listitem-576"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/building-national-cybersecurity-strategy-voluntary-flexible-frameworks/" aria-label="Building a National Cybersecurity Strategy: Voluntary, Flexible Frameworks"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2018/02/Coalition-White-Paper-443x576-c-default.jpg" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2018/02/Coalition-White-Paper-443x576-c-default.jpg 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2018/02/Coalition-White-Paper-640x832-c-default.jpg 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/building-national-cybersecurity-strategy-voluntary-flexible-frameworks/">Building a National Cybersecurity Strategy: Voluntary, Flexible Frameworks</a></h3> </div> </article> <article class="asset__listitem post-listitem-post animate" id="post-listitem-578"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/cert/" aria-label="SEI&#8217;s CERT Division"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2018/02/CERT-443x576-c-default.jpg" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2018/02/CERT-443x576-c-default.jpg 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2018/02/CERT-640x832-c-default.jpg 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/cert/">SEI&#8217;s CERT Division</a></h3> </div> </article> <article class="asset__listitem post-listitem-post animate" id="post-listitem-586"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/cybersecurity-framework/" aria-label="Cybersecurity Framework"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2018/02/NIST-443x576-c-default.jpg" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2018/02/NIST-443x576-c-default.jpg 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2018/02/NIST-640x832-c-default.jpg 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/cybersecurity-framework/">Cybersecurity Framework</a></h3> </div> </article> <article class="asset__listitem post-listitem-post animate" id="post-listitem-582"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/information-sharing-analysis-organizations/" aria-label="Information Sharing and Analysis Organizations"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2018/02/ISAO2-443x576-c-default.jpg" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2018/02/ISAO2-443x576-c-default.jpg 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2018/02/ISAO2-640x832-c-default.jpg 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/information-sharing-analysis-organizations/">Information Sharing and Analysis Organizations</a></h3> </div> </article> <article class="asset__listitem post-listitem-post animate" id="post-listitem-580"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/may-2017-u-s-government-cyber-executive-order/" aria-label="May 2017 U.S. Government Cyber Executive Order"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2018/02/EO-2017-443x576-c-default.jpg" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2018/02/EO-2017-443x576-c-default.jpg 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2018/02/EO-2017-640x832-c-default.jpg 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/may-2017-u-s-government-cyber-executive-order/">May 2017 U.S. Government Cyber Executive Order</a></h3> </div> </article> <article class="asset__listitem post-listitem-post animate" id="post-listitem-570"> <div class="asset__listitem__image"> <a href="https://www.cyberthreatalliance.org/federal-funding-recommendations-rd-relating-improving-security-computer-code/" aria-label="Federal Funding Recs for R&#038;D Relating to Improving Computer Code Security"> <img src="https://www.cyberthreatalliance.org/wp-content/uploads/2018/02/CSIA-CTA-443x576-c-default.jpg" srcset="https://www.cyberthreatalliance.org/wp-content/uploads/2018/02/CSIA-CTA-443x576-c-default.jpg 1x, https://www.cyberthreatalliance.org/wp-content/uploads/2018/02/CSIA-CTA-640x832-c-default.jpg 2x" alt=""> </a> </div> <div class="asset__listitem__content"> <h3 class="asset__listitem__title"><a href="https://www.cyberthreatalliance.org/federal-funding-recommendations-rd-relating-improving-security-computer-code/">Federal Funding Recs for R&#038;D Relating to Improving Computer Code Security</a></h3> </div> </article> </div> <nav aria-label="Page navigation" class="pagination-wrap"> <ul class="pagination"> </ul> </nav> </div> </div> </section> </div> <footer class="footer__wrapper is-layout-constrained wp-block-group alignfull is-style-padded is-style-contrast"> <div class="footer footer__inner is-layout-flow wp-block-group alignwide"> <div class="footer__block footer__block__logo"> <a href="https://www.cyberthreatalliance.org"> <svg xmlns="http://www.w3.org/2000/svg" width="286" height="110" viewBox="0 0 286 110"><g fill="none" fill-rule="evenodd"><g fill-rule="nonzero"><path d="m125.8 106 1.7-4.6h7.7l1.6 4.6h3.6l-7.5-20h-3.1l-7.6 20h3.6Zm8.4-7.4h-5.8l3-8.3 2.8 8.3Zm21 7.4v-2.8h-9V86.1h-3.5V106h12.5Zm15.1 0v-2.8h-9V86.1h-3.5V106h12.5Zm6.3 0V86h-3.4v20h3.4Zm6.3 0 1.6-4.6h7.7l1.7 4.6h3.6l-7.6-20h-3l-7.6 20h3.6Zm8.4-7.4h-5.8l2.9-8.3 2.9 8.3Zm11.9 7.4V91.9l8.9 14.1h3.4V86h-3.4v14.3L203.2 86h-3.5V106h3.5Zm23.8.3a8 8 0 0 0 5.5-1.8 7.2 7.2 0 0 0 2.3-5h-3.4c-.2 1.4-.7 2.5-1.3 3-.7.7-1.7 1-3.1 1-1.5 0-2.6-.6-3.4-1.7a8.7 8.7 0 0 1-1.1-5v-1.7c0-2.1.4-3.7 1.2-4.8a4 4 0 0 1 3.5-1.7c1.3 0 2.2.3 3 1 .6.6 1 1.6 1.2 3h3.4c-.2-2.1-1-3.8-2.3-5a7.7 7.7 0 0 0-5.3-1.8 7.5 7.5 0 0 0-7.2 4.5c-.7 1.4-1 3-1 5V97c0 1.8.4 3.5 1 4.8a7.4 7.4 0 0 0 7 4.4Zm24-.3v-2.8h-9.6v-6h8.1v-2.8h-8.1v-5.5h9.4V86H238V106h13Z" fill="#6E6F72"></path><path d="M136.8 37.4c3.5 0 6.4-.9 8.6-2.8 2.1-1.8 3.3-4.4 3.6-7.8h-5.4c-.3 2.3-1 3.8-2 4.8s-2.7 1.4-4.8 1.4a6 6 0 0 1-5.3-2.6 13.7 13.7 0 0 1-1.9-7.8V20c0-3.4.7-5.9 2-7.6 1.3-1.7 3-2.6 5.4-2.6 2 0 3.6.5 4.7 1.5 1 1 1.7 2.6 2 4.9h5.3c-.3-3.5-1.5-6.1-3.6-8a12 12 0 0 0-8.4-2.8 11.8 11.8 0 0 0-11.3 7c-1 2.3-1.5 4.9-1.5 7.8v3c0 2.8.6 5.3 1.6 7.5a11.6 11.6 0 0 0 11 6.8Zm30-.4V25.5l10.5-19.8h-6l-7.2 14.8L157 5.7h-6l10.5 19.8V37h5.4Zm25.3 0c3.5 0 6.2-.8 8.1-2.4A8.3 8.3 0 0 0 203 28c0-1.8-.4-3.3-1.3-4.6a6.9 6.9 0 0 0-4-2.6 7.5 7.5 0 0 0 3.4-2.6 6.8 6.8 0 0 0 1.2-4c0-2.7-1-4.8-2.8-6.3a13 13 0 0 0-8-2h-10.8V37h11.4Zm-.6-18.1h-5.3V10h5.2c1.9 0 3.3.3 4.2 1 .8.7 1.3 1.8 1.3 3.4a4 4 0 0 1-1.5 3.2c-1 .8-2.2 1.2-4 1.2Zm.7 13.8h-6v-9.8h6.4c3.4 0 5 1.7 5 5 0 1.5-.5 2.6-1.4 3.5-1 .8-2.3 1.3-4 1.3Zm36.7 4.3v-4.3h-15V23h12.9v-4.3h-12.9v-8.6h14.9V5.7h-20.3V37h20.4Zm9.9 0V25h6l6.3 12h5.8v-.3l-7-13a9.6 9.6 0 0 0 4.2-3.3c1-1.4 1.6-3.1 1.6-5.2 0-3-1-5.4-3-7-2-1.7-4.7-2.5-8.3-2.5h-11V37h5.4Zm5.6-16.4h-5.6V10h5.7c2 0 3.3.5 4.3 1.4 1 1 1.4 2.2 1.4 4 0 1.5-.5 2.8-1.5 3.7-1 1-2.5 1.4-4.3 1.4ZM138 76V49.1h9.8v-4.4H123v4.4h9.6V76h5.4Zm19.3 0V62.1h14V76h5.4V44.7h-5.4v13h-14v-13H152V76h5.4Zm31.3 0V64h6l6.3 12h5.8v-.3l-7-13a9.6 9.6 0 0 0 4.2-3.3c1-1.4 1.5-3.1 1.5-5.2 0-3-1-5.4-2.9-7-2-1.7-4.7-2.5-8.4-2.5h-11V76h5.5Zm5.6-16.4h-5.6V49h5.7c2 0 3.3.5 4.3 1.4 1 1 1.4 2.2 1.4 4 0 1.5-.5 2.8-1.5 3.7-1 1-2.5 1.4-4.3 1.4ZM231 76v-4.3h-15V62h12.8v-4.3H216v-8.6H231v-4.4h-20.3V76h20.5Zm7.2 0 2.6-7.3h12l2.6 7.3h5.7l-11.8-31.3h-4.9L232.7 76h5.6Zm13.2-11.7h-9.1l4.5-13 4.6 13ZM275 76V49.1h9.8v-4.4H260v4.4h9.6V76h5.4Z" fill="#FF6700"></path></g><path fill="#6E6F72" d="m41 95.3 15.8 14.3 52.6-55.5-38-37.2-13.2 14.2 21.4 23z"></path><path fill="#FF6700" d="M68.4 14.3 52.6 0 0 55.5l38 37.2 13.3-14.2-21.5-23z"></path></g></svg> <span class="screen-reader-text">Cyber Threat Alliance</span> </a> <div class="footer-social"> <ul> <li> <a href="https://www.facebook.com/CyberThreatAlliance" target="_blank" rel="noopener"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 75.36 75.36"><path d="M0,0V75.36H75.36V0ZM47.59,24.94H44c-2.82,0-3.37,1.34-3.37,3.3v4.33h6.72l-.87,6.78H40.63V56.76h-7V39.35H27.77V32.57h5.86v-5c0-5.8,3.55-9,8.72-9a48.45,48.45,0,0,1,5.24.27Z"/></svg> <span class="screen-reader-text">Facebook</span> </a> </li> <li> <a href="https://twitter.com/CyberAlliance" target="_blank" rel="noopener"> <?xml version="1.0" encoding="UTF-8"?><svg id="a" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 75.36 75.36"><defs><style>.b{stroke-width:0px;}</style></defs><path class="b" d="m0,0v75.36h75.36V0H0Zm44.88,54.67l-9.09-11.88-10.4,11.88h-5.77l13.47-15.39-14.21-18.58h11.89l8.21,10.86,9.5-10.86h5.76l-12.59,14.39,14.81,19.59h-11.6Z"/><polygon class="b" points="25.62 23.96 46.47 51.22 49.66 51.22 29.04 23.96 25.62 23.96"/></svg> <span class="screen-reader-text">X</span> </a> </li> <li> <a href="https://www.youtube.com/channel/UCKF94z58tZRp9kBLJmjzVzA" target="_blank" rel="noopener"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 75.36 75.36"><path d="M0,0V75.36H75.36V0ZM60.83,39.4307a70.1774,70.1774,0,0,1-.4615,7.4964s-.4529,3.1918-1.8448,4.5939a6.6264,6.6264,0,0,1-4.6388,1.9619c-6.4748.4616-16.2051.4789-16.2051.4789S25.6448,53.8533,21.9364,53.5c-1.03-.2-3.3452-.136-5.1089-1.9808-1.3833-1.4021-1.8362-4.5939-1.8362-4.5939a70.4272,70.4272,0,0,1-.4615-7.4963V35.9206a70.2114,70.2114,0,0,1,.4615-7.4963s.4428-3.1919,1.8362-4.5939a6.6281,6.6281,0,0,1,4.6387-1.962c6.4748-.47,16.1965-.47,16.1965-.47H37.68s9.7217,0,16.1965.47a6.6281,6.6281,0,0,1,4.6387,1.962c1.3919,1.402,1.8448,4.5939,1.8448,4.5939v.0014a71.7609,71.7609,0,0,1,.47,7.4963Z" fill="#017bb6"/><polygon points="32.888 43.689 45.395 37.205 32.888 30.676 32.888 43.689" fill="#017bb6"/></svg> <span class="screen-reader-text">YouTube</span> </a> </li> <li> <a href="https://www.linkedin.com/company/cyber-threat-alliance/" target="_blank" rel="noopener"> <svg viewBox="0 0 75.36 75.36"><path d="M0,0V75.36H75.36V0ZM25.83,57.93h-8.9V29.33h8.9ZM21.38,25.42a5.16,5.16,0,1,1,5.15-5.16A5.15,5.15,0,0,1,21.38,25.42ZM59.14,57.93H50.25V44c0-3.32-.06-7.59-4.62-7.59s-5.33,3.61-5.33,7.34V57.93H31.41V29.33h8.53v3.91h.12a9.34,9.34,0,0,1,8.42-4.62c9,0,10.66,5.92,10.66,13.63Z"/></svg> <span class="screen-reader-text">Linked In</span> </a> </li> </ul> </div> </div> <nav class="footer__block footer-menu"> <ul > <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-7943 menu-item-has-children"> <a href="https://www.cyberthreatalliance.org/about/">About CTA</a> <ul class="sub-menu"> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-7949"> <a href="https://www.cyberthreatalliance.org/about/who-we-are/">Who We Are</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8441"> <a href="https://www.cyberthreatalliance.org/about/board-of-directors/">Board of Directors</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8439"> <a href="https://www.cyberthreatalliance.org/about/testimonials/">Testimonials</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8440"> <a href="https://www.cyberthreatalliance.org/about/our-sharing-model/">Our Sharing Model</a> </li> </ul> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8443"> <a href="https://www.cyberthreatalliance.org/membership/">Membership</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-7944"> <a href="https://www.cyberthreatalliance.org/news/">News</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8445"> <a href="https://www.cyberthreatalliance.org/partnerships/">Partnerships</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page current-page-ancestor menu-item-8446"> <a href="https://www.cyberthreatalliance.org/resources/">Resources</a> </li> <li class=" menu-item menu-item-type-post_type menu-item-object-page menu-item-8444"> <a href="https://www.cyberthreatalliance.org/contact/">Contact</a> </li> </ul> </nav> <nav class="footer__block footer-menu"> </nav> </div> </footer> <div class="footer__meta__wrapper is-layout-constrained wp-block-group alignfull is-style-padded is-style-contrast"> <div class="footer__meta footer__meta__inner is-layout-flow wp-block-group alignwide"> <p>&copy; Copyright 2024 Cyber Threat Alliance | <span class="footer-credit">Web Development by <a href="https://beamandhinge.com">Beam &amp; Hinge</a></span></p> </div> </div> </div> <script src="https://www.cyberthreatalliance.org/wp-content/plugins/sg-cachepress/assets/js/lazysizes.min.js" id="siteground-optimizer-lazy-sizes-js-js"></script> <script id="app/0-js-before" nonce="9c2ee6cfeb"> (()=>{"use strict";var r,e={},o={};function t(r){var n=o[r];if(void 0!==n)return n.exports;var a=o[r]={exports:{}};return e[r](a,a.exports,t),a.exports}t.m=e,r=[],t.O=(e,o,n,a)=>{if(!o){var i=1/0;for(v=0;v<r.length;v++){o=r[v][0],n=r[v][1],a=r[v][2];for(var s=!0,f=0;f<o.length;f++)(!1&a||i>=a)&&Object.keys(t.O).every((r=>t.O[r](o[f])))?o.splice(f--,1):(s=!1,a<i&&(i=a));if(s){r.splice(v--,1);var l=n();void 0!==l&&(e=l)}}return e}a=a||0;for(var v=r.length;v>0&&r[v-1][2]>a;v--)r[v]=r[v-1];r[v]=[o,n,a]},t.d=(r,e)=>{for(var o in e)t.o(e,o)&&!t.o(r,o)&&Object.defineProperty(r,o,{enumerable:!0,get:e[o]})},t.o=(r,e)=>Object.prototype.hasOwnProperty.call(r,e),(()=>{var r={666:0};t.O.j=e=>0===r[e];var e=(e,o)=>{var n,a,i=o[0],s=o[1],f=o[2],l=0;if(i.some((e=>0!==r[e]))){for(n in s)t.o(s,n)&&(t.m[n]=s[n]);if(f)var v=f(t)}for(e&&e(o);l<i.length;l++)a=i[l],t.o(r,a)&&r[a]&&r[a][0](),r[a]=0;return t.O(v)},o=self.webpackChunksage=self.webpackChunksage||[];o.forEach(e.bind(null,0)),o.push=e.bind(null,o.push.bind(o))})()})(); </script> <script src="https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/public/js/575.baac18.js" id="app/0-js"></script> <script src="https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/public/js/643.3043e9.js" id="app/1-js"></script> <script src="https://www.cyberthreatalliance.org/wp-content/themes/cyberthreatalliance/public/js/app.b6caba.js" id="app/2-js"></script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10