Cyber Law & Information Security
The information is power, security (C, I & A) of this, therefore becomes a matter of utmost importance. The advancement in technology, the Internet, and information sharing has had both positive...
View ArticleICTTF - Germany
This is a forum to discuss the legal challenges in the German market with respect to security. Inspection versus blocking implementation and how it impacts employees and security threat mitigation, auf...
View ArticleBletchley Park - Station X
Open Source Intelligence (OSINT) Acquisition Anonymous, LulzSec, AntiSec, etc...
View ArticleCall For Papers in Cyber Security
The sole intention in creating this group is the timely notification and availability of the information to all the genuine cyber security and its allied field researchers so that the interested one...
View ArticleMalaysia Cyber Threat Task Force
A Cyber Threat collaboration group for all technology professionals who have worked in both the Public and Private sectors. Topics that will be covered, include Cyberthreats, Cybersecurity, Cyberwarfare.
View ArticleBletchley Park - Public Reading Room
The Bletchley Park Reading Room is a publicly accessible room where ICTTF members may request to view (But not Download) certain documents collected during past investigations. Information regarding...
View ArticlePhysical Security
This group is dedicated to the physical security that we in digital operations tend to forget about. Just being a part of a community such as ICTTF can make you a target. Let's do what we can to be...
View ArticleBletchley Park - Secure Reading Room 1
Reading room for documents containing sensitive and or classified materials. Access restricted!
View ArticleCyberwarfare
Group dedicated to discuss threats and best measures in cyberwarfare situations
View ArticleISO27K Standards - User Group
A group to help people work with, understand and benefit from ISO 27K (ISO 27000-series) related standards. The ISO/IEC 27000-series numbering (“ISO27k”) has been reserved for a family of information...
View ArticleCoderDojo Mentors
A group for those running or interested in running CoderDojo's. More information on CoderDojo can be found at www.CoderDojo.com
View ArticleStop Cyber Bullies
Cyber Bullying represents an all too real threat to children. In this group we discuss how this issue can be managed and dealt with.
View ArticleDublin Chapter - Cyber Security Roundtable
An ICTTF Security Roundtable Chapter is a chance for you to become involved in a community of professionals. Get involved with your local chapter and you will make valuable connections with peers,...
View ArticleCyber Security in Social Media
Unscrupulous Enterprises Are Using Social Media Especially Facebook To Spread Malware Via Links Being Spread By Fake Profiles and Paid Sponsored Ads
View ArticlePbxwall
Setting the standard in Phone Fraud protection. Innovative anti-fraud technology that blocks PBX Hacking and stops Toll Fraud.
View ArticleSystem Infiltration
A group to discuss conventional and nonconventional methods used by cyber criminals to infiltrate, disrupt or disable components of a technology based infrastructure. Ways to defend against such...
View ArticleHuman Side of the Insider Threat
This group will discuss causal factors and mitigations for minimizing the growth of insider threats within government agencies and commercial companies.
View ArticleETHiCAL HACKING
Some would argue that Ethical hacking and Penetration Testing is the same thing, Ummm Yes and No. This group will help with how to best understand the difference and to discuss the tools and techniques...
View ArticleInformation Security Awareness
INformation Security Awareness is sometimes a common category that is often times miss-understood. While there is an tremendous amount of awareness materials for individuals as well as organizations...
View ArticleDigital Forensics
Share digital forensics best practices, opinions, ideas and help on technical issues
View ArticleComputer Security Incident Response Team
A Computer Security Incident Response Team (CSIRT) is a service organization that is responsible for receiving, reviewing, and responding to computer security incident reports and activity. Their...
View ArticleMultidisciplinary Cyber Security Studies
Information Security, Penetration Testing, Incident Management, Perception Management, International Relations, Sociology, Psychology, Criminology, Identity Construction
View Article