Resources
Incident Reporting to the U.S. Government
Criminal Activity (led by FBI) – https://www.ic3.gov
Identity Theft (led by FTC) – https://www.identitytheft.gov/
Computer or Network Vulnerabilities (led by DHS NCCIC) – https://us-cert.cisa.gov/
Other U.S. Government and Related Resources
National Vulnerability Database (NIST) – https://nvd.nist.gov/
Common Vulnerabilities and Exposures Database (MITRE) – https://cve.mitre.org/
CISA Services Catalog (DHS) – https://www.cisa.gov/publication/cisa-services-catalog
Cybersecurity Framework (NIST) – https://www.nist.gov/cyberframework
National Institute for Cybersecurity Education (NIST)- https://www.nist.gov/itl/applied-cybersecurity/nice
Training, Awareness and Advocacy Resources
National Cybersecurity Alliance – https://staysafeonline.org/
Stop. Think. Connect. – https://www.stopthinkconnect.org/
SANS Institute – https://www.sans.org/
Cybrary – https://www.cybrary.it/
Open Security Training – http://opensecuritytraining.info/
Small Business Resources
Cybersecurity Toolkit (Global Cyber Alliance) – https://gcatoolkit.org/smallbusiness/
Small Business Cybersecurity Corner (NIST) – https://www.nist.gov/itl/smallbusinesscyber
Cybersecurity for Small Business (FTC)- https://www.ftc.gov/tips-advice/business-center/small-businesses/cybersecurity
Small Business Cyberplanner (FCC) – https://www.fcc.gov/cyberplanner
ISS Cyber Risk Score (Institutional Shareholder Services, Inc.) – https://iss-cyber.com/
The Small Business Guide to Cybersecurity (SBA SCORE) – https://www.score.org/resource/small-business-guide-cybersecurity
Preparing for a Cyber Incident: Quick Guides for Improved Readiness (U.S. Secret Service) – https://www.secretservice.gov/investigation/Preparing-for-a-Cyber-Incident
News and Reading
Dark Reading – https://darkreading.com
Krebs on Security – https://krebsonsecurity.com
Naked Security by Sophos – https://nakedsecurity.sophos.com
Security Ledger – https://securityledger.com
The Akamai Blog – https://blogs.akamai.com
Threatpost – https://threatpost.com
Talos Intelligence Blog – https://blog.talosintelligence.com/
Cybersecurity Canon – https://icdt.osu.edu/cybercanon
Local and Statewide Resources
Cleveland State University / Center for Cybersecurity and Privacy Protection – https://www.law.csuohio.edu/academics/cybersecurity
Case Western Reserve University / Institute for Smart, Secure and Connected Systems (ISSACS) – https://case.edu/issacs/
University of Akron – https://www.uakron.edu/cybersecurity
Ohio State University / Institute for Cybersecurity and Digital Trust – https://ece.osu.edu/faculty-research/institute-cybersecurity-and-digital-trust
Ohio Cyber Range Institute (OCRI) – https://www.ohiocyberrangeinstitute.org/
Hurricane Labs Blog – https://www.hurricanelabs.com/blog
MCPc Blog – https://www.mcpc.com/Insights/Blog
Binary Defense Systems Blog – https://www.binarydefense.com/blog-2
TrustedSec Blog – https://www.trustedsec.com/category/articles
RSM/SecureState War Room – https://warroom.rsmus.com
MRK Technologies Blog – https://www.mrktech.com/blog/