Select GTP Document to provide feedback on.
A Step-by-Step Guide to Becoming a CISO - Patrick Hevesi
Using Penetration Testing and Red Teams to Assess and Improve Security by Augusto Barros
How to Hunt for Security Threats by Anton Chuvakin
Comparison of Mobile Threat Defense Solutions - Patrick Hevesi
DDoS: A Comparison of Defense Approaches - Patrick Hevesi
Mobile Device Security: A Comparison of Platforms - Patrick Hevesi
Understanding and Implementing Security in Office 365: Exchange Online, SharePoint Online and OneDrive for Business - Patrick Hevesi
Applying Deception Technologies and Techniques to Improve Threat Detection and Response by Anton Chuvakin
How to Plan, Design, Operate and Evolve a SOC by Anton Chuvakin
Demystifying Security Analytics: Sources, Methods and Use Cases by Anton Chuvakin
A Comparison of UEBA Technologies and Solutions by Anton Chuvakin
Enter other GTP document title. (Only use this if document was not in question 1 list)
Rate the Overall document quality (1 - 5, Lowest to Highest)
How effective was the Guidance/Recommendations? (1 - 5, Lowest to Highest)
How effective were the graphics/tables? (1 - 5, Lowest to Highest)
What was missing, do you have any suggestions of content to add or questions to be answered in a future version of this document?
Any other comments?
Are you willing to be contacted for follow up? Please provide email