Skip to content

The Cyber Resilience Institute

Advancing Critical Infrastructure Protection

  • About Us
    • Board of Directors
    • Programs
    • Privacy Policy
    • Contact Us
  • Sports-ISAO
  • c-Watch
    • c-Watch Apprenticeship
    • c-Watch Accomplishments
    • c-Watch Course
    • CrowdWatch
    • c-Market
      • Toolkit
        • Getting Started: Top Resources
        • Community Building Handbook
        • Cyber Threat Intelligence Resources
        • Creating a SOC for the ISAO
          • S1- Consolidate Computer Network Defense Under One Organization
          • S2 – Achieve Balance on Size: Agility Ratio
          • S3 – Give SOC Authority
          • S4 – Do a Few Things Well
          • S5- Favor Staff Quality over Quantity
          • S6 – Maximize the Value of Technology Purchases
          • S7 – Exercise Discrimination in Data You Gather
          • S8 – Protect the Security Operations Center Mission
          • S9 – Be a Sophisticated Consumer and Producer of Cyber Threat Intelligence
          • S10 – Stop. Think. Respond… Calmly
  • Training
    • Summary of Cyber Threat Hunting Models
    • STIX 2.1 Programmer’s Guide
    • Integrating CTI Into Your SOC
  • Blog
  • Partners
    • CyberUSA
    • Global Resilience Federation
    • National Cybersecurity Center
  • Terms & conditions
  • Opt-out preferences

JaneDukeTalkSmall1

You must log in to post a comment.

Post navigation

Previous PostPrevious JaneDukeTalkSmall1

Search Site

Recent Blog Entries

  • How to Shield Your New Business Against Cyber Threats
  • It’s Precedent — The Human Body is Subject to Property Law, which Enables a Digital DNA Right
  • Cyber Wyoming Conference
  • Comparing the Roles of the CISO vs. the CSO
  • Why Now is the Best Time to Start a Cybersecurity Business
  • Board Member Jane Ginn is honored by Oasis Open
  • November Cybersecurity and Information Environment Webinar
  • New c-Watch Elections 2020 Flyer
  • Cyber Research in Academic Institutions
  • IISC 2020
  • National Cybersecurity Center partners with Cyber Resilience Institute on c-Watch Training
  • COVID-19 Impact on Cybersecurity
DougAtISAOmeeting
JaneDukeTalkSmall1
cyber-security-hall-of-fame_2015
Chuck

The Cyber Resilience Institute is a 501 (c)(3) Not-for-Profit registered in the state of Colorado.  Our programs are focused on the cyber resilience of all US critical infrastructure.

  • c-Watch Apprenticeship
  • c-Watch Accomplishments
  • c-Watch Course
Privacy Policy Proudly powered by WordPress
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}
 

Loading Comments...
 

You must be logged in to post a comment.