Resources

Cybersecurity resources provide the industry with a centralized source of trusted information. If you have any questions, especially about our membership process, contact us.

Download and share these materials that tell the story of CTA, including CTA’s Joint Analysis reports, which focus on specific threats and campaign activity.

  • CTA in Focus (September 2021)

  • Closing the Gap: Expanding Cyber Deterrence

    About the Cyberstability Paper Series Since the...
  • CTA In Focus (June 2021)

  • Updated CTA 2020 Summer Olympics Threat Assessment

  • CTA In Focus (March 2021)

  • More Sunlight, Fewer Shadows: Guidelines for Establishing & Strengthening Government Vulnerability Disclosure Policies

CTA members routinely provide other members with access to and review of blogs and intelligence reports describing malicious cyber activity.  By sharing research on significant issues, CTA members leverage their data, analysis, and cybersecurity products to expose malicious activity, prevent additional harm, and mitigate any of the activity’s effects as early and as effectively as possible.

Use the search function to search by CTA member company name or research title. Results can also be filtered by date of publication.

Searching Member Shares...

CTA regularly hosts webinars featuring individual leaders in the cybersecurity space, including from representatives of our members and partners. Check for upcoming webinars on our Events page or click through below to view details and watch past webinars.

Searching Webinars...
13 results found.

Adversary Playbooks are an attempt to capture the complete collection of tools, techniques, and procedures that adversaries use to achieve their goals, arrayed in a logical sequence using the Lockheed Martin Cyber Kill Chain. If the cybersecurity community and network defenders have access to these playbooks, they can make their defensive actions more effective and impose increased costs on our adversaries. The Cyber Threat Alliance (CTA) is committed to sharing actionable intelligence that can be used to create Adversary Playbooks. Since our cyber adversaries adapt very rapidly, CTA also automates the sharing and updating of this intelligence.

This page serves as a resource for the cybersecurity community with useful tools for creating Adversary Playbooks and links to the Playbooks created by our members. If you have any questions or feedback, please contact us at admin@cyberthreatalliance.org.

Use the search function to find playbooks by CTA member author, adversary group, or threat actor.

Searching Playbooks...
39 results found.