These are the sources and citations used to research SCOM Cyber Consultancy. This bibliography was generated on Cite This For Me on
In-text: (MITRE ATT&CK Framework, 2022)
Your Bibliography: Attack.mitre.org. 2022. MITRE ATT&CK Framework. [online] Available at: <https://attack.mitre.org/matrices/enterprise/> [Accessed 19 July 2022].
In-text: (Indicators of Compromise - IoC versus IoA, 2022)
Your Bibliography: Crowdstrike. 2022. Indicators of Compromise - IoC versus IoA. [online] Available at: <https://www.crowdstrike.com/cybersecurity-101/indicators-of-compromise/ioa-vs-ioc/> [Accessed 19 July 2022].
In-text: (Why managing outsourcing risk should be a top priority for businesses, 2022)
Your Bibliography: Deloitte Malta. 2022. Why managing outsourcing risk should be a top priority for businesses. [online] Available at: <https://www2.deloitte.com/mt/en/pages/risk/articles/mt-risk-article-managing-outsourcing-risk.html> [Accessed 19 July 2022].
In-text: (National CISO wants to see cyber to be seen as a patient issue, 2022)
Your Bibliography: Digital Health. 2022. National CISO wants to see cyber to be seen as a patient issue. [online] Available at: <https://www.digitalhealth.net/2022/03/national-ciso-cyber/> [Accessed 19 July 2022].
In-text: (Digital, CISO and CEO, 2022)
Your Bibliography: Digital, N., CISO, N. and CEO, N., 2022. NHS Digital appoints Pete Rose as new Chief Information Security Officer (CISO) for the health and care system and Deputy CEO - NHS Digital. [online] NHS Digital. Available at: <https://digital.nhs.uk/news/2020/nhs-digital-appoints-new-ciso> [Accessed 19 July 2022].
In-text: (NHS Data Security and Protection Toolkit, 2022)
Your Bibliography: Dsptoolkit.nhs.uk. 2022. NHS Data Security and Protection Toolkit. [online] Available at: <https://www.dsptoolkit.nhs.uk/News/2021-2022-standard> [Accessed 19 July 2022].
In-text: (Insights from the 2020 Cyber Coordination Groups, 2022)
Your Bibliography: FCA. 2022. Insights from the 2020 Cyber Coordination Groups. [online] Available at: <https://www.fca.org.uk/publications/research/insights-cyber-coordination-groups-2020> [Accessed 19 July 2022].
In-text: (Definition of Managed Security Service Provider (MSSP) - Gartner Information Technology Glossary, 2022)
Your Bibliography: Gartner. 2022. Definition of Managed Security Service Provider (MSSP) - Gartner Information Technology Glossary. [online] Available at: <https://www.gartner.com/en/information-technology/glossary/mssp-managed-security-service-provider> [Accessed 19 July 2022].
In-text: (Gartner Top Security and Risk Trends in 2022, 2022)
Your Bibliography: Gartner. 2022. Gartner Top Security and Risk Trends in 2022. [online] Available at: <https://www.gartner.com/en/articles/7-top-trends-in-cybersecurity-for-2022> [Accessed 19 July 2022].
In-text: (Why co-sourcing is a smart choice for cybersecurity now | BT's Global unit, 2022)
Your Bibliography: Globalservices.bt.com. 2022. Why co-sourcing is a smart choice for cybersecurity now | BT's Global unit. [online] Available at: <https://www.globalservices.bt.com/en/insights/whitepapers/why-co-sourcing-is-a-smart-choice-for-cybersecurity-now> [Accessed 19 July 2022].
In-text: (Evolving NHS Cyber Security ICS Landscape, 2022)
Your Bibliography: Healthcare Digital. 2022. Evolving NHS Cyber Security ICS Landscape. [online] Available at: <https://www.healthcare.digital/single-post/evolving-nhs-cyber-security-ics-landscape> [Accessed 19 July 2022].
In-text: (Incident Response Models, 2022)
Your Bibliography: ISACA. 2022. Incident Response Models. [online] Available at: <https://www.isaca.org/en/resources/isaca-journal/issues/2020/volume-4/incident-response-models> [Accessed 19 July 2022].
In-text: (What does a CISO do?, 2022)
Your Bibliography: IT Pro. 2022. What does a CISO do?. [online] Available at: <https://www.itpro.co.uk/careers/28228/ciso-job-description-what-does-a-ciso-do> [Accessed 19 July 2022].
In-text: (Step IT up: the dangers of over-reliance on outsourced IT services - McGrathNicol, 2022)
Your Bibliography: McGrathNicol. 2022. Step IT up: the dangers of over-reliance on outsourced IT services - McGrathNicol. [online] Available at: <https://www.mcgrathnicol.com/insight/step-dangers-reliance-outsourced-services/> [Accessed 19 July 2022].
In-text: (How to create a Vulnerability management team, work flow-chart, process, roles, and…, 2022)
Your Bibliography: Medium. 2022. How to create a Vulnerability management team, work flow-chart, process, roles, and…. [online] Available at: <https://faun.pub/how-to-create-a-vulnerability-management-team-work-flow-chart-process-roles-and-be3eb1bad0d3> [Accessed 19 July 2022].
In-text: (Yes. Cyber Leaders Can Reduce Distracting Work, 2022)
Your Bibliography: Medium. 2022. Yes. Cyber Leaders Can Reduce Distracting Work. [online] Available at: <https://medium.com/ciso-cyber-leaders/yes-cyber-leaders-can-reduce-distracting-work-f00954879863> [Accessed 19 July 2022].
In-text: (Outsourced vs. in-house cybersecurity: pros and cons, 2022)
Your Bibliography: Nordlayer.com. 2022. Outsourced vs. in-house cybersecurity: pros and cons. [online] Available at: <https://nordlayer.com/blog/outsourced-vs-in-house-cybersecurity-pros-and-cons/> [Accessed 19 July 2022].
In-text: (Understanding Incident Response Frameworks - NIST & SANS, 2022)
Your Bibliography: Stickmancyber.com. 2022. Understanding Incident Response Frameworks - NIST & SANS. [online] Available at: <https://www.stickmancyber.com/cybersecurity-blog/incident-response-frameworks-nist-sans> [Accessed 19 July 2022].
In-text: (Team, 2022)
Your Bibliography: Team, T., 2022. The Hybrid SOC Model - Maximising Detection & Response | Redscan. [online] Redscan. Available at: <https://www.redscan.com/news/the-hybrid-soc-model-how-outsourced-expertise-can-help-maximise-threat-detection-and-response/> [Accessed 19 July 2022].
In-text: (I know what you're thinking: Outsource or in-source IT security? I've worked both sides, so here's my advice..., 2022)
Your Bibliography: Theregister.com. 2022. I know what you're thinking: Outsource or in-source IT security? I've worked both sides, so here's my advice.... [online] Available at: <https://www.theregister.com/2018/11/02/cyber_security_sourcing/> [Accessed 19 July 2022].
10,587 students joined last month!