Attention: You are using an outdated browser, device or you do not have the latest version of JavaScript downloaded and so this website may not work as expected. Please download the latest software or switch device to avoid further issues.

Download Section

Search for your Document

Search

Share your Documents

All Documents

Frameworks

MITRE Fight Fraud Framework™: Design Principles and Methodology April 2026

The MITRE Fight Fraud Framework (F3)™ is an authoritative, analyst-developed knowledge base of fraud actor behavior in cyber-based fraud incidents, gr…

NIST Cybersecurity Framework Profile for Artificial Intelligence April 2026

Recent advancements in Artificial Intelligence (AI) technology introduce new cybersecurity 184 opportunities and challenges for organizations. Long ac…

NSA Cyber Assessment Framework 4.0

The CAF - A tool for assessing cyber resilience The Cyber Assessment Framework (CAF) provides a systematic and comprehensive approach to assessing the…

Guidelines

The ENISA Cybersecurity Exercise Methodology February 2026

End-to-end guide on how to plan, run and evaluate an exercise In today's digital landscape, organisations face increasing cyber threats. Cybersecurit…

NIST Secure Domain Name System Deployment Guide March 2026

The Domain Name System (DNS) is an integral part of any enterprise network architecture. An attack against the DNS infrastructure of an enterprise thr…

Confused Deputy Attacks on Autonomous AI Agents March 2026

The Anatomy of a Confused Deputy Attack Chain For purposes of this analysis, a confused deputy attack on an AI agent can be understood as a fourstage …

Presentations

260506_SIGS Event: Markus Luchsinger - Setting the Stage: The Shift from Chatbots to Action-Oriented

This introductory session will provide a short update on the newest AI trends: what has truly advanced and where expectations still exceed reality. We…

260506_SIGS Event: Dr. Rehana Harasgama, Kellerhals Carrard Zürich - Outsourcing Intelligence, Not L

Deploying third-party AI agents unlocks value – but also legal risk. This session cuts through the theory and focuses on practical dos and don'ts acro…

260506_SIGS Event: Dan Sarel, Descope Securing AI Agents and MCP Servers for the Enterprise

As organizations deploy agentic AI and MCP projects, they face unique identity management hurdles that introduce security risk and prevent production-…

Reports

Anthropic - System Card: Claude Mythos Preview

This System Card describes Claude Mythos Preview, a large language model from Anthropic. Claude Mythos Preview is our most capable frontier model to d…

NIST Challenges to the Monitoring of Deployed AI Systems March 2026

As artificial intelligence (AI) is integrated into commercial and government applications, there is growing demand to monitor these systems after epl…

Research Studies

VulnOps: Vulnerability Management in the Age of AI

Key Takeaways The volume, velocity, and character of software vulnerability disclosure have shifted faster than the operating model most organizations…

GCSP - The International Security April 2026 and Military Implications of Agentic AI

Building on recent advances, agentic artificial intelligence (AI) is an emerging technological paradigm and the next wave in AI development that enabl…

Trend Report

Interpol Global Financial Fraud Threat Assessement

This second edition of the INTERPOL Global Financial Fraud Threat Assessment examines how the fraud landscape has evolved over the past two years, hig…

Whitepapers

WEF - Organizational Transformation in the Age of AI March 2026

Artificial intelligence (AI) is entering a decisive phase. Across industries and regions, organizations are moving beyond experimentation and demonstr…

WEF Elevating Cybersecurity Ensuring Strategic and Sustainable Impact for CISOs Oct. 2025

This white paper explores the evolution of the CISO role in the face of rising complexity, outlining how this complexity manifests, what it demands of…

image

Contact Us

Security Interest Group Switzerland
c/o Bridge Head AG
Sulzbergstrasse 34
5430 Wettingen
Switzerland

Follow Us

This website is powered by
ToucanTech