Custom Guide BuilderSearchSearchFiltersFilter by MethodsMethodsFilter by ActivitiesActivitiesFilter by Org SizeOrg SizeFilter by ApproachesApproachesFilter by Full Safetag Guide ContentMethod: PreparationRead MoreActivitiesSelect AllSelect NoneAssessment PlanConfidentiality AgreementIncident Response and Emergency ContactRegional Context ResearchTechnical Context ResearchAudit Timeline and PlanningMethod: Context ResearchRead MoreActivitiesSelect AllSelect NoneRegional Context ResearchTechnical Context ResearchMethod: Capacity AssessmentRead MoreActivitiesSelect AllSelect NoneInterviewsGuiding Questions for High-Risk OrganisationsCapacity Assessment ChecklistMethod: ReconnaissanceRead MoreActivitiesSelect AllSelect NoneManual ReconnaissanceAutomated ReconnaisanceWebsite FootprintingDNS EnumerationMethod: Organizational Policy ReviewRead MoreActivitiesSelect AllSelect NoneIdentifying Informal AgreementsSecurity policy reviewInterviewsA Day in the LifeMethod: Network MappingRead MoreActivitiesSelect AllSelect NoneNetwork ScanningNetwork AccessNetwork Traffic AnalysisRemote Network and User Device AssessmentRouter Based AttacksVoIP Security AssessmentWireless Range MappingMonitor Open Wireless TrafficMethod: Organizational Device UsageRead MoreActivitiesSelect AllSelect NoneDevice and Behaviour AssessmentPassword Security SurveyA Day in the LifeA Night in the LifeAssessing Usage of Cloud ServicesNetwork ScanningGuided TourCheck Browser and Plugin VulnerabilitiesMethod: User Device AssessmentRead MoreActivitiesSelect AllSelect NoneDevice and Behaviour AssessmentMobile Device AssessmentA Day in the LifeA Night in the LifeFirewire Access to Encrypted/Locked computersPassword Security SurveyPassword StrengthGuided TourCheck Browser and Plugin VulnerabilitiesRemote Network and User Device AssessmentMethod: Vulnerability Scanning and AnalysisRead MoreActivitiesSelect AllSelect NoneVulnerability ScanningVulnerability ResearchWebsite FootprintingWeb Vulnerability AssessmentVoIP Security AssessmentCheck Config FilesRouter Based AttacksMethod: Data AssessmentRead MoreActivitiesSelect AllSelect NoneSensitive DataRisks of Data Lost and FoundAssessing Usage of Cloud ServicesThe Impacts of a Lost DeviceThe Impacts of a "Found" DevicePrivate DataMethod: Physical and Operational SecurityRead MoreActivitiesSelect AllSelect NoneGuided TourOperational Security SurveyOffice MappingScavenger HuntMonitor Open Wireless TrafficWireless Range MappingA Day in the LifeA Night in the LifeMethod: Process Mapping and Risk ModelingRead MoreActivitiesSelect AllSelect NoneProcess MappingRisk Modeling Using the Pre-Mortem StrategyCreating a Risk MatrixSensitive DataSelf DoxingMethod: Responding to Advanced ThreatsRead MoreActivitiesSelect AllSelect NoneSuspicious Activity AnalysisDigital Forensics and Evidence CaptureForensic AnalysisIncident Response and Emergency ContactTechnical Context ResearchNetwork ScanningMethod: Threat AssessmentRead MoreActivitiesSelect AllSelect NoneRisk Modeling Using the Pre-Mortem StrategyGuiding Questions for High-Risk OrganisationsSensitive DataThreat IdentificationCreating a Risk MatrixThreat InteractionRegional Context ResearchSelf DoxingAssessing legal threatsMethod: Responsive SupportRead MoreActivitiesSelect AllSelect NoneMethod: DebriefRead MoreActivitiesSelect AllSelect NoneMethod: Follow UpRead MoreActivitiesSelect AllSelect NoneFollow-up MeetingMaking IntroductionsLong-Term Follow-upStaff Feedback SurveyMethod: Report Creation and Recommendation DevelopmentRead MoreActivitiesSelect AllSelect NoneCreating a Risk MatrixRoadmap DevelopmentResource IdentificationReport CreationSelected Safetag Guide ContentGenerate PDF GuideDownload Full GuideNo sections selected← Select activities from the panel to the left to build your custom guide
Full Safetag Guide ContentMethod: PreparationRead MoreActivitiesSelect AllSelect NoneAssessment PlanConfidentiality AgreementIncident Response and Emergency ContactRegional Context ResearchTechnical Context ResearchAudit Timeline and PlanningMethod: Context ResearchRead MoreActivitiesSelect AllSelect NoneRegional Context ResearchTechnical Context ResearchMethod: Capacity AssessmentRead MoreActivitiesSelect AllSelect NoneInterviewsGuiding Questions for High-Risk OrganisationsCapacity Assessment ChecklistMethod: ReconnaissanceRead MoreActivitiesSelect AllSelect NoneManual ReconnaissanceAutomated ReconnaisanceWebsite FootprintingDNS EnumerationMethod: Organizational Policy ReviewRead MoreActivitiesSelect AllSelect NoneIdentifying Informal AgreementsSecurity policy reviewInterviewsA Day in the LifeMethod: Network MappingRead MoreActivitiesSelect AllSelect NoneNetwork ScanningNetwork AccessNetwork Traffic AnalysisRemote Network and User Device AssessmentRouter Based AttacksVoIP Security AssessmentWireless Range MappingMonitor Open Wireless TrafficMethod: Organizational Device UsageRead MoreActivitiesSelect AllSelect NoneDevice and Behaviour AssessmentPassword Security SurveyA Day in the LifeA Night in the LifeAssessing Usage of Cloud ServicesNetwork ScanningGuided TourCheck Browser and Plugin VulnerabilitiesMethod: User Device AssessmentRead MoreActivitiesSelect AllSelect NoneDevice and Behaviour AssessmentMobile Device AssessmentA Day in the LifeA Night in the LifeFirewire Access to Encrypted/Locked computersPassword Security SurveyPassword StrengthGuided TourCheck Browser and Plugin VulnerabilitiesRemote Network and User Device AssessmentMethod: Vulnerability Scanning and AnalysisRead MoreActivitiesSelect AllSelect NoneVulnerability ScanningVulnerability ResearchWebsite FootprintingWeb Vulnerability AssessmentVoIP Security AssessmentCheck Config FilesRouter Based AttacksMethod: Data AssessmentRead MoreActivitiesSelect AllSelect NoneSensitive DataRisks of Data Lost and FoundAssessing Usage of Cloud ServicesThe Impacts of a Lost DeviceThe Impacts of a "Found" DevicePrivate DataMethod: Physical and Operational SecurityRead MoreActivitiesSelect AllSelect NoneGuided TourOperational Security SurveyOffice MappingScavenger HuntMonitor Open Wireless TrafficWireless Range MappingA Day in the LifeA Night in the LifeMethod: Process Mapping and Risk ModelingRead MoreActivitiesSelect AllSelect NoneProcess MappingRisk Modeling Using the Pre-Mortem StrategyCreating a Risk MatrixSensitive DataSelf DoxingMethod: Responding to Advanced ThreatsRead MoreActivitiesSelect AllSelect NoneSuspicious Activity AnalysisDigital Forensics and Evidence CaptureForensic AnalysisIncident Response and Emergency ContactTechnical Context ResearchNetwork ScanningMethod: Threat AssessmentRead MoreActivitiesSelect AllSelect NoneRisk Modeling Using the Pre-Mortem StrategyGuiding Questions for High-Risk OrganisationsSensitive DataThreat IdentificationCreating a Risk MatrixThreat InteractionRegional Context ResearchSelf DoxingAssessing legal threatsMethod: Responsive SupportRead MoreActivitiesSelect AllSelect NoneMethod: DebriefRead MoreActivitiesSelect AllSelect NoneMethod: Follow UpRead MoreActivitiesSelect AllSelect NoneFollow-up MeetingMaking IntroductionsLong-Term Follow-upStaff Feedback SurveyMethod: Report Creation and Recommendation DevelopmentRead MoreActivitiesSelect AllSelect NoneCreating a Risk MatrixRoadmap DevelopmentResource IdentificationReport Creation
Selected Safetag Guide ContentGenerate PDF GuideDownload Full GuideNo sections selected← Select activities from the panel to the left to build your custom guide