Jenny Lent
Stengthening Cyber Defenses for SLTTs webinar resources
2023 Top Routinely Exploited Vulnerabilities
2022 Top Routinely Exploited Vulnerabilities
KEV Catalogue
Secure by Demand Guide: How Software Customers Can Drive a Secure Technology Ecosystem
Decider Fact sheet
Helping Cyber Defenders “Decide” to Use MITRE ATT&CK - Blog
CISA and MITRE ATT&CK - Best Practices Mapping Guide
CISA’s Decider Tool
Joe Lape
Presentation by Scale Computing
CISA
Summary for week of November 18
Summary for week of November 25
Summary for week of December 2
Microsoft
Adobe
Apple
Mimecast Through IU
Cybersecurity Event with the White House and Arete
Additional information will be sent out prior.