Skip to content

Downloads & Reports

A selection of downloads and reports created by the CSA team.

Datasheet: DORA

Financial entities must comply to the DORA regulations by January 2025. With only a few months to go, now is a critical time to assess and make sure that you are fully compliant.

DORA: The Digital Operational Resilience Act

The Digital Operational Resilience Act is a European framework that establishes a uniform approach regarding the security integrity of the information and communication technology (ICT) systems processed by participants in the financial markets within the European Union’s jurisdiction.

Threat Report: Lazarus

This report documents the threat group Lazarus and their TTPs (Tactics, Techniques and Procedures). Containing recommendations to help detect and mitigate the threat. The report also includes references where information within this report was identified from.

Threat Report: PowerDrop PowerShell Attack On Aerospace Industry

This report documents the lifecycle of the PowerDrop Malware and their TTPs (Tactics, Techniques and Procedures). Containing recommendations to help detect and mitigate the threat. The report also includes references where information within this report was identified from.

Threat Report: Lapsus$

This report documents the threat group Lapsus$ and their TTPs (Tactics, Techniques and Procedures), and contains recommendations to help detect and mitigate the emerging threat. The report also includes references to where the information within this report was identified from.

AppGuard Enterprise

With the increasing number of Cyber Extortion, Ransomware and Malware attacks, standard anti-virus and other infrastructure security products may not be enough to defend and defeat these sophisticated attacks.

Cyber Framework Assessments

The Cyber Assessment Framework provides a methodical and comprehensive approach to gauging the extent to which cyber risks are managed and conducted. 

Cyber Incident Response Exercise

Most companies operating within the defence sector will require enhanced levels of cyber security if they work with the Ministry of Defence. This often requires evidence that the UK’s Cyber Essential and Cyber Essential Plus certifications have been achieved. 

Crisis Response Capabilities

When a company falls victim to a cyber-attack it can be a difficult situation to resolve on their own without the right guidance and tools. For any cyber attack, timing is crucial. It is essential to respond swiftly to avoid any further damage.

Defence Study

Most companies operating within the defence sector will require enhanced levels of cyber security if they work with the Ministry of Defence. This often required evidence that the UK’s Cyber Essential and Cyber Essential Plus certifications have been achieved. 

e-Learning

It might come as a surprise, but one of the biggest causes for a security breach isn’t by security bugs or malfunctions; it is, in 
fact, human error.

Incident Response and Implementation

Many organisations treat any incident response with a reactive and unstructured approach. 
However, information security incidents need to be approached with a timely and well-coordinated response to maximise recovery when multiple stakeholders are involved.

Monitoring & Detecting

For the majority of companies, the lack of sufficient cyber-security is a result of small 
budgets. Often minimum numbers of endpoints monitored can be cost-prohibitive, so a 
more scalable and affordable solution is required.

Offshore Financial Trust

The movement of electronic information and data is crucial for the Financial Industry to 
function, including personal, commercial, legal and financial information. This type of 
sensitive data is an attractive target to cyber-criminals looking to leverage the information 
to their advantage, therefore it is essential to have effective protection in place.

SOC as a Service

For the majority of companies, the lack of sufficient cyber-security is a result of
small budgets. Often minimum numbers of endpoints monitored can be cost-prohibitive,
so a more scalable and affordable solution is required.

Transport Industry

Transport networks have become increasingly digitalised, with a wide range of data 
flowing across systems on a regular basis. As more devices and control systems are 
connected online, the risk factors to the storage and management of this sensitive 
information are increased

Training

It might come as a surprise, but one of the biggest causes for a security breach isn’t by security bugs or malfunctions; it is, in 
fact, human error. According to a study by CompTIA, human error accounts for 52 percent of the root causes of security 
breaches which are the result of a variety of scenarios including weak passwords, sending sensitive data to the wrong 
recipients, sharing password or account information and falling for phishing scams.
Have a question?

Contact Us

Would you like to talk to us and find out more about our services?