Pro Cyber Resources

❕
UNDER CONSTRUCTION - don’t mind the unorganized layout, but here is a piece of what to expect

Modern Data Engineering Stack for CyberModern Data Engineering Stack for Cyber🌐Cybersecurity Ontologies, Taxonomies, and Mental ModelsπŸ‘οΈPragmatic Data Privacy for Cyber ProfessionalsπŸŸͺAwesome Purple Teaming🚩Awesome CTF ResourcesπŸŸ₯Awesome Red Teaming🟦Awesome Blue TeamingRegex - Regular Expressions

Promising Cyber Tools

  • IT Network Mapping Technologies

Cyber & Data Privacy Intelligence Sources - Databases & Sources to Use for Analytics and Integrating Apps/Services + Platforms for Risk Management

Vendors

Related Solution Terminology and Buzzwords

Externally Mapped

  • Vendor Intelligence
  • Vendor Profiling
  • Vendor Management
  • 3rd Party Risk Management - TPRM
    • IT Vendor Risk Management
  • Procurement
  • Risk Governance
  • Risk Management
  • Data Governance
  • Data Privacy
    • GDPR Vendor Management

Internally Mapped

  • RBVM - Risk-Based Vulnerability Management
  • ASOC - Application Security Orchestration and Correlation

IT Vendor Risk Management and Intelligence

Vendor Privacy Risk Intelligence

Vendor Lists