Attention: You are using an outdated browser, device or you do not have the latest version of JavaScript downloaded and so this website may not work as expected. Please download the latest software or switch device to avoid further issues.

Download Section

Search for your Document

Search

Share your Documents

All Documents

Frameworks

NSA Cyber Assessment Framework 4.0

The CAF - A tool for assessing cyber resilience The Cyber Assessment Framework (CAF) provides a systematic and comprehensive approach to assessing the…

Introductory Guidance to AICM

The AI Controls Matrix (AICM) provides a foundational security and governance framework for AI service providers and customers. It helps them securely…

Using Zero Trust to Secure Enterprise Information in LLM Environments

The rapid adoption of Generative AI (GenAI) is transforming organizational workflows. However, it's also escalating risks related to data privacy, int…

Guidelines

NIST Secure Domain Name System Deployment Guide March 2026

The Domain Name System (DNS) is an integral part of any enterprise network architecture. An attack against the DNS infrastructure of an enterprise thr…

Confused Deputy Attacks on Autonomous AI Agents March 2026

The Anatomy of a Confused Deputy Attack Chain For purposes of this analysis, a confused deputy attack on an AI agent can be understood as a fourstage …

Dr. Zero Trust - Empowering Small Businesses

Unlock the power to take control of your cybersecurity—without spending a dime. Dr. Joe Trust reveals a revolutionary, free tool designed specifically…

Presentations

Reports

NIST Challenges to the Monitoring of Deployed AI Systems March 2026

As artificial intelligence (AI) is integrated into commercial and government applications, there is growing demand to monitor these systems after epl…

Research Studies

WEF - Global Cybersecurity Outlook 2026

Executive Summary Cybersecurity in 2026 is accelerating amid growing threats, geopolitical fragmentation and a widening technological divide. Artifici…

Trend Report

Interpol Global Financial Fraud Threat Assessement

This second edition of the INTERPOL Global Financial Fraud Threat Assessment examines how the fraud landscape has evolved over the past two years, hig…

Whitepapers

WEF Elevating Cybersecurity Ensuring Strategic and Sustainable Impact for CISOs Oct. 2025

This white paper explores the evolution of the CISO role in the face of rising complexity, outlining how this complexity manifests, what it demands of…

image

Contact Us

Security Interest Group Switzerland
c/o Bridge Head AG
Sulzbergstrasse 34
5430 Wettingen
Switzerland

Follow Us

This website is powered by
ToucanTech