{"id":13,"date":"2024-04-03T12:41:39","date_gmt":"2024-04-03T12:41:39","guid":{"rendered":"https:\/\/infosectaskforce.com\/?page_id=13"},"modified":"2024-04-03T12:58:50","modified_gmt":"2024-04-03T12:58:50","slug":"cybersecurity-papers","status":"publish","type":"page","link":"https:\/\/infosectaskforce.com\/index.php\/cybersecurity-papers\/","title":{"rendered":"Cybersecurity Papers"},"content":{"rendered":"\n<p>Papers on various Information Technology and Security topics.<\/p>\n\n\n<ul class=\"wp-block-categories-list wp-block-categories\">\t<li class=\"cat-item cat-item-2\"><a href=\"https:\/\/infosectaskforce.com\/index.php\/category\/bu-asignments\/\">Bellevue University Papers<\/a> (3)\n<\/li>\n\t<li class=\"cat-item cat-item-16\"><a href=\"https:\/\/infosectaskforce.com\/index.php\/category\/email-security\/\">Email Security<\/a> (1)\n<\/li>\n\t<li class=\"cat-item cat-item-10\"><a href=\"https:\/\/infosectaskforce.com\/index.php\/category\/security-leadership\/\">Security Leadership<\/a> (2)\n<\/li>\n\t<li class=\"cat-item cat-item-1\"><a href=\"https:\/\/infosectaskforce.com\/index.php\/category\/uncategorized\/\">Uncategorized<\/a> (2)\n<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-query is-layout-flow wp-block-query-is-layout-flow\"><ul class=\"wp-block-post-template is-layout-flow wp-block-post-template-is-layout-flow\"><li class=\"wp-block-post post-75 post type-post status-publish format-standard has-post-thumbnail hentry category-uncategorized tag-cybersecurity tag-incident-response-strategy tag-risk tag-security-leadership\">\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\"><figure class=\"wp-block-post-featured-image\"><a href=\"https:\/\/infosectaskforce.com\/index.php\/2026\/03\/23\/when-is-it-an-incident-and-not-just-the-business-of-cybersecurity\/\" target=\"_self\"  ><img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"512\" src=\"https:\/\/infosectaskforce.com\/wp-content\/uploads\/2026\/03\/WhenIsItAnIncident50.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"When Is It an Incident and Not Just the Business of Cybersecurity?\" style=\"object-fit:cover;\" srcset=\"https:\/\/infosectaskforce.com\/wp-content\/uploads\/2026\/03\/WhenIsItAnIncident50.png 768w, https:\/\/infosectaskforce.com\/wp-content\/uploads\/2026\/03\/WhenIsItAnIncident50-300x200.png 300w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/a><\/figure><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:75%\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/infosectaskforce.com\/index.php\/2026\/03\/23\/when-is-it-an-incident-and-not-just-the-business-of-cybersecurity\/\" target=\"_self\" >When Is It an Incident and Not Just the Business of Cybersecurity?<\/a><\/h2><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-70 post type-post status-publish format-standard has-post-thumbnail hentry category-email-security category-security-leadership tag-cybersecurity tag-dmarc tag-email-security tag-monitoring\">\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\"><figure class=\"wp-block-post-featured-image\"><a href=\"https:\/\/infosectaskforce.com\/index.php\/2026\/03\/13\/turning-dmarc-reports-into-security-intelligence\/\" target=\"_self\"  ><img decoding=\"async\" width=\"1152\" height=\"768\" src=\"https:\/\/infosectaskforce.com\/wp-content\/uploads\/2026\/03\/dmarcmonitoring.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Turning DMARC Reports into Security Intelligence\" style=\"object-fit:cover;\" srcset=\"https:\/\/infosectaskforce.com\/wp-content\/uploads\/2026\/03\/dmarcmonitoring.png 1152w, https:\/\/infosectaskforce.com\/wp-content\/uploads\/2026\/03\/dmarcmonitoring-300x200.png 300w, https:\/\/infosectaskforce.com\/wp-content\/uploads\/2026\/03\/dmarcmonitoring-1024x683.png 1024w, https:\/\/infosectaskforce.com\/wp-content\/uploads\/2026\/03\/dmarcmonitoring-768x512.png 768w\" sizes=\"(max-width: 1152px) 100vw, 1152px\" \/><\/a><\/figure><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:75%\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/infosectaskforce.com\/index.php\/2026\/03\/13\/turning-dmarc-reports-into-security-intelligence\/\" target=\"_self\" >Turning DMARC Reports into Security Intelligence<\/a><\/h2><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-48 post type-post status-publish format-standard has-post-thumbnail hentry category-security-leadership category-uncategorized tag-crisis-management tag-incident-response-readiness tag-incident-response-strategy tag-security-leadership tag-tabletop-exercises\">\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\"><figure class=\"wp-block-post-featured-image\"><a href=\"https:\/\/infosectaskforce.com\/index.php\/2026\/02\/09\/you-dont-have-an-incident-response-plan-you-have-a-theory\/\" target=\"_self\"  ><img decoding=\"async\" width=\"768\" height=\"512\" src=\"https:\/\/infosectaskforce.com\/wp-content\/uploads\/2026\/02\/failedIRPSmaller.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"You Don\u2019t Have an Incident Response Plan \u2014 You Have a Theory\" style=\"object-fit:cover;\" srcset=\"https:\/\/infosectaskforce.com\/wp-content\/uploads\/2026\/02\/failedIRPSmaller.png 768w, https:\/\/infosectaskforce.com\/wp-content\/uploads\/2026\/02\/failedIRPSmaller-300x200.png 300w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/a><\/figure><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:75%\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/infosectaskforce.com\/index.php\/2026\/02\/09\/you-dont-have-an-incident-response-plan-you-have-a-theory\/\" target=\"_self\" >You Don\u2019t Have an Incident Response Plan \u2014 You Have a Theory<\/a><\/h2><\/div>\n<\/div>\n\n<\/li><\/ul><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Papers on various Information Technology and Security topics.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-13","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/infosectaskforce.com\/index.php\/wp-json\/wp\/v2\/pages\/13","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosectaskforce.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosectaskforce.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosectaskforce.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosectaskforce.com\/index.php\/wp-json\/wp\/v2\/comments?post=13"}],"version-history":[{"count":2,"href":"https:\/\/infosectaskforce.com\/index.php\/wp-json\/wp\/v2\/pages\/13\/revisions"}],"predecessor-version":[{"id":19,"href":"https:\/\/infosectaskforce.com\/index.php\/wp-json\/wp\/v2\/pages\/13\/revisions\/19"}],"wp:attachment":[{"href":"https:\/\/infosectaskforce.com\/index.php\/wp-json\/wp\/v2\/media?parent=13"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}