Documents

2020 Internet Crime Report [PDF]
2020 Internet Crime Report
FBI | March 17, 2021

Interim National Security Strategic Guidance [PDF]
Interim National Security Strategic Guidance
White House | March 2021

Iron Rain: Understanding Nation-State Motives and APT Groups [PDF]
Iron Rain: Understanding Nation-State Motives and APT Groups
VMWare | February 2021

Securing the DoD Supply Chain. CMMC [PDF]
Securing the DoD Supply Chain (CMMC)
Katie Arrington | November 4, 2020

Fact Sheet for Cybersecurity Education Diversity Initiative (CEDI) [PDF]
Fact Sheet for Cybersecurity Education Diversity Initiative (CEDI)
NSA | October 15, 2020

Request for Information/Proposal (RFI/RFP) Contract Strategy Considerations to Implement the CMMC [PDF]
Request for Information/Proposal (RFI/RFP) Contract Strategy Considerations to Implement the CMMC
Chris Newborn, DAU Cybersecurity Enterprise Team | September 22, 2020

DFARS Open Cases Report
DFARS Open Cases Report
A report of the open DFARS cases as of 9.21.20.

Framework for CMMC-AB Credentialed Professionals and Accredited Organizations [PPT]
Framework for CMMC-AB Credentialed Professionals and Accredited Organizations
Jeff Dalton, Director AB Chair, Credentialing Committee | May 8, 2020 v2.9

Dragos MISI DreamPort Partner Brief [PDF]
Dragos MISI DreamPort Partner Brief
Providing a Realistic Cyber Test Environment for Defenders.

Nozomi Asset Intelligence Data Sheet [PDF]
Nozomi Asset Intelligence Data Sheet
Nozomi Networks Asset Intelligence⢠continuously updates Guardian™ appliances with rich OT and IoT device data so you can identify and respond to the most important security alerts faster.

NIST Special Publication: Guide to Industrial Control Systems (ICS) Security [PDF]
NIST Special Publication: Guide to Industrial Control Systems (ICS) Security
Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control System Configurations such as Programmable Logic Controllers (PLC).

CATO Data Sheet [PDF]
CATO Data Sheet
CATO matches the operational cadence of real-world attacks by executing proven campaigns, operations, and tasks honed over eight years and a million hours protecting CyberPoint's customers. The results, or CATO Findings, are automatically generated by our expert system or manually created by our experienced operators and presented to the customer through dashboard service tiles.