Quantcast
Channel: ICTTF International Cyber Threat Task Force: Groups
Browsing latest articles
Browse All 34 View Live

Cyber Law & Information Security

The information is power, security (C, I & A) of this, therefore becomes a matter of utmost importance. The advancement in technology, the Internet, and information sharing has had both positive...

View Article


ICTTF - Germany

This is a forum to discuss the legal challenges in the German market with respect to security. Inspection versus blocking implementation and how it impacts employees and security threat mitigation, auf...

View Article


Bletchley Park

Intelligence Analysis Development Program

View Article

Bletchley Park - Station X

Open Source Intelligence (OSINT) Acquisition Anonymous, LulzSec, AntiSec, etc...

View Article

Call For Papers in Cyber Security

The sole intention in creating this group is the timely notification and availability of the information to all the genuine cyber security and its allied field researchers so that the interested one...

View Article


Malaysia Cyber Threat Task Force

A Cyber Threat collaboration group for all technology professionals who have worked in both the Public and Private sectors. Topics that will be covered, include Cyberthreats, Cybersecurity, Cyberwarfare.

View Article

Bletchley Park - Public Reading Room

The Bletchley Park Reading Room is a publicly accessible room where ICTTF members may request to view (But not Download) certain documents collected during past investigations. Information regarding...

View Article

Physical Security

This group is dedicated to the physical security that we in digital operations tend to forget about. Just being a part of a community such as ICTTF can make you a target. Let's do what we can to be...

View Article


Bletchley Park - Secure Reading Room 1

Reading room for documents containing sensitive and or classified materials. Access restricted!

View Article


Cyberwarfare

Group dedicated to discuss threats and best measures in cyberwarfare situations

View Article

ISO27K Standards - User Group

A group to help people work with, understand and benefit from ISO 27K (ISO 27000-series) related standards. The ISO/IEC 27000-series numbering (“ISO27k”) has been reserved for a family of information...

View Article

ICTTF FRANCE

CYBER-CRIMINALITY INVESTIGATION

View Article

CoderDojo Mentors

A group for those running or interested in running CoderDojo's. More information on CoderDojo can be found at www.CoderDojo.com

View Article


Stop Cyber Bullies

Cyber Bullying represents an all too real threat to children. In this group we discuss how this issue can be managed and dealt with.

View Article

Dublin Chapter - Cyber Security Roundtable

An ICTTF Security Roundtable Chapter is a chance for you to become involved in a community of professionals. Get involved with your local chapter and you will make valuable connections with peers,...

View Article


Cyber Security in Social Media

Unscrupulous Enterprises Are Using Social Media Especially Facebook To Spread Malware Via Links Being Spread By Fake Profiles and Paid Sponsored Ads

View Article

Pbxwall

Setting the standard in Phone Fraud protection. Innovative anti-fraud technology that blocks PBX Hacking and stops Toll Fraud.

View Article


System Infiltration

A group to discuss conventional and nonconventional methods used by cyber criminals to infiltrate, disrupt or disable components of a technology based infrastructure. Ways to defend against such...

View Article

Human Side of the Insider Threat

This group will discuss causal factors and mitigations for minimizing the growth of insider threats within government agencies and commercial companies.

View Article

ETHiCAL HACKING

Some would argue that Ethical hacking and Penetration Testing is the same thing, Ummm Yes and No. This group will help with how to best understand the difference and to discuss the tools and techniques...

View Article

Information Security Awareness

INformation Security Awareness is sometimes a common category that is often times miss-understood. While there is an tremendous amount of awareness materials for individuals as well as organizations...

View Article


Digital Forensics

Share digital forensics best practices, opinions, ideas and help on technical issues

View Article


Myanmar Information Security Professionals

View Article

Computer Security Incident Response Team

A Computer Security Incident Response Team (CSIRT) is a service organization that is responsible for receiving, reviewing, and responding to computer security incident reports and activity. Their...

View Article

Multidisciplinary Cyber Security Studies

Information Security, Penetration Testing, Incident Management, Perception Management, International Relations, Sociology, Psychology, Criminology, Identity Construction

View Article

Browsing latest articles
Browse All 34 View Live