Cyber Espionage
Cyber Espionage is the act or practice of obtaining secrets without the permission of the holder of the information (personal, sensitive, proprietary or of classified nature), from individuals,...
View ArticlePCI Compliance
Aimed at professionals who specilaise in the payments and security industry.
View ArticleAvoiding Global Thermonuclear War
Discussing the employee compliance of policies in regards to preventing human caused breach and protecting propitiatory (and personal) information.
View ArticleIndonesia Chapter Cyber Threat Task Force
Indonesia Chapter of ICTTF is a NOT-FOR-PROFIT initiative to bring security awareness in common people who use computers and internet in their daily life. It’s a member driven open community to make...
View ArticleCyberstalking law research
I'm writing MA Thesis about criminal liability for cyberstalking. In this group I want share with you my observations and please you to share your opinion about law from your country.
View ArticleComputer Security Incident Response Team
A Computer Security Incident Response Team (CSIRT) is a service organization that is responsible for receiving, reviewing, and responding to computer security incident reports and activity. Their...
View ArticleMultidisciplinary Cyber Security Studies
Information Security, Penetration Testing, Incident Management, Perception Management, International Relations, Sociology, Psychology, Criminology, Identity Construction
View ArticleCyber Law & Information Security
The information is power, security (C, I & A) of this, therefore becomes a matter of utmost importance. The advancement in technology, the Internet, and information sharing has had both positive...
View ArticleICTTF - Germany
This is a forum to discuss the legal challenges in the German market with respect to security. Inspection versus blocking implementation and how it impacts employees and security threat mitigation, auf...
View ArticleBletchley Park - Station X
Open Source Intelligence (OSINT) Acquisition Anonymous, LulzSec, AntiSec, etc...
View ArticleCall For Papers in Cyber Security
The sole intention in creating this group is the timely notification and availability of the information to all the genuine cyber security and its allied field researchers so that the interested one...
View ArticleMalaysia Cyber Threat Task Force
A Cyber Threat collaboration group for all technology professionals who have worked in both the Public and Private sectors. Topics that will be covered, include Cyberthreats, Cybersecurity, Cyberwarfare.
View ArticleBletchley Park - Public Reading Room
The Bletchley Park Reading Room is a publicly accessible room where ICTTF members may request to view (But not Download) certain documents collected during past investigations. Information regarding...
View ArticlePhysical Security
This group is dedicated to the physical security that we in digital operations tend to forget about. Just being a part of a community such as ICTTF can make you a target. Let's do what we can to be...
View ArticleBletchley Park - Secure Reading Room 1
Reading room for documents containing sensitive and or classified materials. Access restricted!
View ArticleCyberwarfare
Group dedicated to discuss threats and best measures in cyberwarfare situations
View ArticleISO27K Standards - User Group
A group to help people work with, understand and benefit from ISO 27K (ISO 27000-series) related standards. The ISO/IEC 27000-series numbering (“ISO27k”) has been reserved for a family of information...
View Article
More Pages to Explore .....