Newsletter Events News Contact Us Buy

Reading Room

Welcome to Integris Security LLC Reading Room. Now that you've arrived its time to check into our registration process and enjoy the various documents, links, references, etc...

Thanks for stopping by and let us know if this resource was useful to you!

PreviewPreview
DownloadDownload
TitleScared of a hacked election?
DescriptionThe soft, unguarded underbelly of our nation's election process is revealed.
FileNameScared_of_a_hacked_election.pdf
PostAuth OnlyNo
Date Added2016-11-22 10:30:52
Downloads344

PreviewPreview
DownloadDownload
TitleAre Drones on your Radar Screen?
DescriptionCountering the UAV Threat in the Correctional Environment Pennsylvania Prison Wardens Association Conference - October 13, 2016
FileNameIntegrisSecurity-UAV-Threat-Correctional-Institutions-Environment
PostAuth OnlyNo
Date Added2016-10-13 16:45:06
Downloads738

PreviewPreview
DownloadDownload
TitleSuffolk County Becomes UAV Threat Detection Proving Grounds
DescriptionFirst-in-the nation initiative fights contraband smuggling into prisons.
FileNameIntegris-Security-Press-Release-Suffolk_County_Becomes_UAV_Threat_Detection_Proving_Grounds.pdf
PostAuth OnlyNo
Date Added2016-06-16 14:19:00
Downloads756

PreviewPreview
DownloadDownload
TitleInformation Security in Corporate Valuation
DescriptionWe meet great companies all the time, and sometimes find that they aren't always positioned to do an accurate valuation on companies, especially when it concerns mergers and acquisitions.
FileNameInformation-Security-Corporate-Valuation.pdf
PostAuth OnlyNo
Date Added2016-06-06 05:16:02
Downloads441

PreviewPreview
DownloadDownload
TitleTen Common Mistakes Boards Make
DescriptionTen Common Mistakes Boards Make
FileNameTen Common Mistakes Boards Make
PostAuth OnlyNo
Date Added2014-12-02 23:50:49
Downloads2014

PreviewPreview
DownloadDownload
TitleOCIE CYBERSECURITY INITIATIVE
DescriptionOCIE will be conducting examinations of more than 50 registered broker dealers and registered investment advisers, focusing on areas related to cybersecurity.
FileNameOCIE_CyberSecurity_Initiative.pdf
PostAuth OnlyNo
Date Added2014-04-21 13:20:53
Downloads1215

PreviewPreview
DownloadDownload
TitleFramework for Improving Critical Infrastructure Cybersecurity
DescriptionThe Framework focuses on using business drivers to guide cybersecurity activities and considering cybersecurity risks as part of the organization’s risk management processes. The Framework consists of three parts: the Framework Core, the Framework Profile, and the Framework Implementation Tiers. The Framework Core is a set of cybersecurity activities, outcomes, and informative references that are common across critical infrastructure sectors, providing the detailed guidance for developing individual organizational Profiles. Through use of the Profiles, the Framework will help the organization align its cybersecurity activities with its business requirements, risk tolerances, and resources. The Tiers provide a mechanism for organizations to view and understand the characteristics of their approach to managing cybersecurity risk.
FileNameNIST_Critical_Infrastructure_Cybersecurity_2014.pdf
PostAuth OnlyNo
Date Added2014-02-13 21:54:42
Downloads1622

PreviewPreview
DownloadDownload
TitleThe Federal Government’s Track Record on Cybersecurity and Critical Infrastructure
DescriptionIn the past few years, we have seen significant breaches in cybersecurity which could affect critical U.S. infrastructure. Data on the nati dams, including those which could kill Americans if they failed, were stolen by a malicious intruder. Nuclear plants’ confidential cybersecurity plans have been left unprotected.
FileNameCyberReport_USGov_Routinely_Hacked_Report.pdf
PostAuth OnlyNo
Date Added2014-02-05 16:27:45
Downloads1780

PreviewPreview
DownloadDownload
TitlePOINT OF SALE (POS) MALWARE INFECTIONS Ref: 14-EIR-3744
DescriptionThe National Cyber Investigative Joint Task Force briefing regarding the recent PoS malware attacks against Target and others.
FileNamePointOfSale_Malware_Report_NCIJTF.pdf
PostAuth OnlyNo
Date Added2014-02-04 21:24:19
Downloads1943

PreviewPreview
DownloadDownload
TitleNSA and Quantum Computers
DescriptionThis document was leaked and contains a classification schedule in regards to Quantum Computer's capabilities.
FileNamensa_quantum_rsa.pdf
PostAuth OnlyNo
Date Added2014-01-04 15:09:08
Downloads1469

PreviewPreview
DownloadDownload
TitlePCI DSS v3 Change Highlights
DescriptionThis document highlights the changes between PCI DSS v2 standard and PCI DSS v3 standard.
FileNamePCIDSS_version_3_changes.pdf
PostAuth OnlyNo
Date Added2013-12-26 11:00:25
Downloads1448

PreviewPreview
DownloadDownload
TitleDHS - Cybersecurity Questions for CEOs
DescriptionThis document provides key questions to guide leadership discussions about cybersecurity risk management for your company, along with key cyber risk management concepts.
FileNameDHS_CyberSecurityQuestionsForCLevel.pdf
PostAuth OnlyNo
Date Added2013-10-04 14:27:47
Downloads1594

PreviewPreview
DownloadDownload
TitleNational Cyber Security Awareness Month – 10th Anniversary October 2013
DescriptionRecognizing the importance of cybersecurity awareness, President Obama designated October as National Cyber Security Awareness Month (NCSAM). The Department of Homeland Security is committed to raising cybersecurity awareness across the nation and to working across all levels of government, the private sector, and internationally to protect against and respond to cyber incidents. Now in its 10th year, NCSAM is designed to engage and educate public and private sector partners through events and initiatives with the goal of raising awareness about cybersecurity to increase the resiliency of the nation in the event of a cyber incident. Since the President’s proclamation in 2004, NCSAM has been formally recognized by Congress, federal, state and local governments, as well as leaders from industry and academia. This united effort is necessary to maintain a cyberspace that is safer, more resilient, and remains a source of tremendous opportunity and growth for years to come.
FileNamencsam_2013.pdf
PostAuth OnlyNo
Date Added2013-09-27 13:46:38
Downloads2504

  Copyright © 2013-2017   Site Map  Terms of Use Privacy Policy