Skip to content

Downloads & Reports

Access the latest cyber security whitepapers, research, and compliance guides from CSA Cyber to stay informed and prepared. 

Regulations and compliance

csrb-intro
PDF
Guide

Cyber Security and Resilience Bill: A leader's introduction

Explore the key principles behind the Cyber Security and Resilience Bill; from what is changing to which organisations are impacted.

csrb-90
PDF
Guide

Cyber Security and Resilience Bill: A 90-day readiness guide

A practical, phased 90‑day roadmap built to help security and technology leaders prepare for the UK’s upcoming Cyber Security and Resilience Bill.

caf
PDF
Guide

Guide: CAF v4.0 Implementation for Practitioners

This guide offers a practical roadmap for those responsible for aligning with the framework, helping teams benchmark cyber maturity, identify gaps in governance and technical controls, and confidently meet the demands of CAF 4.0.

DORA
PDF
Guide

DORA: The Digital Operational Resilience Act

The Digital Operational Resilience Act is a European framework that establishes a uniform approach regarding the security integrity of the information and communication technology (ICT) systems processed by participants in the financial markets within the European Union’s jurisdiction.

Threat intelligence and offensive security

Akira
PDF
Threat Report

Threat Report: Akira

Discover how CSA Cyber’s expert analysts detect and defend against one of today’s most aggressive ransomware groups; Akira.

Lazarus
PDF
Threat Report

Threat Report: Lazarus

This report documents the threat group Lazarus and their TTPs (Tactics, Techniques and Procedures). Containing recommendations to help detect and mitigate the threat. The report also includes references where information within this report was identified from.

Powershell
PDF
Threat Report

Threat Report: PowerDrop PowerShell Attack On Aerospace Industry

This report documents the lifecycle of the PowerDrop Malware and their TTPs (Tactics, Techniques and Procedures). Containing recommendations to help detect and mitigate the threat. The report also includes references where information within this report was identified from.

Lapsus
PDF
Threat Report

Threat Report: Lapsus$

This report documents the threat group Lapsus$ and their TTPs (Tactics, Techniques and Procedures), and contains recommendations to help detect and mitigate the emerging threat. The report also includes references to where the information within this report was identified from.

red-team-inforgraphic
PDF
Infographic

Red Team VS Blue Team Infographic: Who wins the battle against cyber crime?

Discover the unique, but equally heroic, missions undertaken by Red and Blue Teams, and uncover the powerful tactics they deploy to support businesses in combating evolving threats in our must-see infographic.

Datasheets and case studies

Cyber-framework-assessments
PDF
Case study

Cyber Framework Assessments

The Cyber Assessment Framework provides a methodical and comprehensive approach to gauging the extent to which cyber risks are managed and conducted.

IRTE-1
PDF
Datasheet

Datasheet: Virtual CISO

Our Virtual Chief Information Security Officer (VCISO) services provide organisations with on-demand access to experienced cyber security leadership at a fraction of the cost of a full-time employee.

IRTE-2
PDF
Datasheet

Datasheet: Incident Response Tabletop Exercises

With the cyber threat landscape rapidly evolving, organisations must be prepared to detect, respond, and recover from security incidents swiftly and effectively.

DORA-datasheet
PDF
Datasheet

Datasheet: DORA

Financial entities must comply to the DORA regulations by January 2025. With only a few months to go, now is a critical time to assess and make sure that you are fully compliant.

Apguard
PDF
Case study

AppGuard Enterprise

With the increasing number of Cyber Extortion, Ransomware and Malware attacks, standard anti-virus and other infrastructure security products may not be enough to defend and defeat these sophisticated attacks.

CIRE
PDF
Case study

Cyber Incident Response Exercise

Most companies operating within the defence sector will require enhanced levels of cyber security if they work with the Ministry of Defence. This often requires evidence that the UK’s Cyber Essential and Cyber Essential Plus certifications have been achieved.

Crisis
PDF
Case study

Crisis Response Capabilities

When a company falls victim to a cyber-attack it can be a difficult situation to resolve on their own without the right guidance and tools. For any cyber attack, timing is crucial. It is essential to respond swiftly to avoid any further damage.

Defence
PDF
Case study

Defence Study

Most companies operating within the defence sector will require enhanced levels of cyber security if they work with the Ministry of Defence. This often required evidence that the UK’s Cyber Essential and Cyber Essential Plus certifications have been achieved.

e-learning
PDF
Datasheet

e-Learning

It might come as a surprise, but one of the biggest causes for a security breach isn’t by security bugs or malfunctions; it is, in fact, human error.

IR-1
PDF
Case study

Incident Response and Implementation

However, information security incidents need to be approached with a timely and well-coordinated response to maximise recovery when multiple stakeholders are involved.

Monitoring
PDF
Case study

Monitoring & Detecting

For the majority of companies, the lack of sufficient cyber-security is a result of small budgets. Often minimum numbers of endpoints monitored can be cost-prohibitive, so a more scalable and affordable solution is required.

OFT
PDF
Case study

Offshore Financial Trust

The movement of electronic information and data is crucial for the Financial Industry to function, including personal, commercial, legal and financial information. This type of sensitive data is an attractive target to cyber-criminals looking to leverage the information to their advantage, therefore it is essential to have effective protection in place.

soc
PDF
Case study

SOC as a Service

For the majority of companies, the lack of sufficient cyber-security is a result ofsmall budgets. Often minimum numbers of endpoints monitored can be cost-prohibitive,so a more scalable and affordable solution is required.

Transport
PDF
Case study

Transport Industry

Transport networks have become increasingly digitalised, with a wide range of data flowing across systems on a regular basis. As more devices and control systems are connected online, the risk factors to the storage and management of this sensitive information are increased

Training
PDF
Datasheet

Training

It might come as a surprise, but one of the biggest causes for a security breach isn’t by security bugs or malfunctions; it is, in fact, human error. According to a study by CompTIA, human error accounts for 52 percent of the root causes of security breaches which are the result of a variety of scenarios including weak passwords, sending sensitive data to the wrong recipients, sharing password or account information and falling for phishing scams.