Search Records

8 datasets found
  • Open Information

    Security considerations when using social media in your organization ITSM.10.066

    This document discusses common social media threats and recommends security and privacy protection measures that your organization can implement to safeguard users, processes, and technologies involved in creating and publishing posts online.
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Post-secondary cyber security related programs

    The intent of this guide is not to recommend any schools or programs, but to provide a listing of available programs that may help advance an individual’s career in the field of cyber security.
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Certifications in the field of cyber security

    The guide provides information about many of the certifications available for prospective students and cyber security professionals. The intent is not to recommend any certification body or certification in particular, but to provide a listing of some of the different certifications that may help...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Cyber security career guide

    On this page Types of careers Who is hiring? Career pathways Cyber security education
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Digital footprint (ITSAP.00.133)

    Your organization uses the Internet to carry out business activities, provide employees with remote work capabilities, and offer services to clients. As your employees and partners carry out activities on different online platforms and applications, consider the digital footprint they leave...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Implementation guidance: email domain protection (ITSP.40.065 v1.1)

    This document provides guidance to system owners on implementing technical security measures to protect their domains from email spoofing. In this document, we describe technical measures that system owners can implement to prevent the delivery of certain malicious messages that are abusing the...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Security considerations for industrial control systems (ITSAP.00.050)

    An industrial control system (ICS) automates and controls industrial processes (e.g. manufacturing, product handling, production, and distribution) and mechanical functions to keep processes and machinery running smoothly. An ICS may support critical infrastructure (e.g. energy and utilities,...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
  • Open Information

    Developing your incident response plan (ITSAP.40.003)

    Your incident response plan includes the processes, procedures, and documentation related to how your organization detects, responds to, and recovers from incidents. Cyber threats, natural disasters, and unplanned outages are examples of incidents that will impact your network, systems, and...
    Organization:
    Communications Security Establishment Canada
    Resource Formats:
    • HTML
You can also access this registry using the API (see API Docs).