Lock Picking
Policies and Standards
- Foundstone Security Policy
- British Standards Group
- The Center for Internet Security
- DOD IA Security Checklists
- Georgia Institute of Technology Policy
- Information Assurance Support Environment Policy and Guidance
- ISO 17799 Community Portal
- ISO IEC Metadata Standards
- ISO IEC 11179 Metadata Registries
- Information Shield Policy Resources
- Information Security Policy World
- IT Compliance Institute
- Introduction to Security Polices Part 1
- Introduction to Security Policies Part 2
- National Center for Supercomputing Applications (NCSA) Policy
- NSA Security Configuration Guides
- SANS Policies
- Security Bastion
- Site Security Handbook
- Unified Compliance Document Authority List
Regulatory and Compliance
BITS Financial Institution Shared Assessments Program (FISAP)
- Breach Notification Laws – By State
- COSO and COBIT Center
- FFIEC Homepage
- FFIEC IT Examination Handbook
- Federal Plan for Cyber Security and Information Assurance Research and Development
- NCO – National Coordination Office for Networking and Information Technology Research and Development (NITRD) Publications
- NIST Federal Information Processing Standards (FIIPS)
- NIST Special Publications
- Presidential Decision Directives
- Pubic Health Information Network (PHIN)
- SAS70
- Unified Compliance Tracked Documents Matrix
Risk Assessment
- DoH National Infrastructure Protection Plan (NIPP)
- FEMA RMS Publications
- Octave
- Risk Associates
- Security Officers Management & Analysis Project
Security Management/Governance
- Creating and Maintaining a Successful Security Operations Center (SOC)
- Fred Cohen & Associates
- Generally Accepted Systems Security Principles
- Institute of Information Security Professionals
- Information Security Management Maturity Model (ISM3)
- ISACA
- IT Security Cookbook
- Key Components of Risk Based Security Plan
- Organization for Economic Cooperation and Development (OECD)
Security Conferences
Social Engineering
Threat and Vulnerabilty