Attention: You are using an outdated browser, device or you do not have the latest version of JavaScript downloaded and so this website may not work as expected. Please download the latest software or switch device to avoid further issues.

Download Section

Search for your Document

Search

Share your Documents

All Documents

Frameworks

MITRE Fight Fraud Framework™: Design Principles and Methodology April 2026

The MITRE Fight Fraud Framework (F3)™ is an authoritative, analyst-developed knowledge base of fraud actor behavior in cyber-based fraud incidents, gr…

NIST Cybersecurity Framework Profile for Artificial Intelligence April 2026

Recent advancements in Artificial Intelligence (AI) technology introduce new cybersecurity 184 opportunities and challenges for organizations. Long ac…

NSA Cyber Assessment Framework 4.0

The CAF - A tool for assessing cyber resilience The Cyber Assessment Framework (CAF) provides a systematic and comprehensive approach to assessing the…

Guidelines

The ENISA Cybersecurity Exercise Methodology February 2026

End-to-end guide on how to plan, run and evaluate an exercise In today's digital landscape, organisations face increasing cyber threats. Cybersecurit…

NIST Secure Domain Name System Deployment Guide March 2026

The Domain Name System (DNS) is an integral part of any enterprise network architecture. An attack against the DNS infrastructure of an enterprise thr…

Confused Deputy Attacks on Autonomous AI Agents March 2026

The Anatomy of a Confused Deputy Attack Chain For purposes of this analysis, a confused deputy attack on an AI agent can be understood as a fourstage …

Presentations

260415-SIGS-Event: NVISO-Chasing Ghosts Detecting Token Abuse in the Microsoft Cloud

SIGS 10th Cloud Security Forum April 15th, 2026 Maxim Deweerdt, Cyber Defense Expert at NVISO Security and Principal Instructor at SANS Chasing Ghos…

260415-SIGS-Event: Pragmatica & e3 Third Country Intercept Risk in the Cloud

SIGS 10th Cloud Security Forum April 15th, 2026 Doron Zimmermann, Senior Manager Enterprise Cyber & Information Security at Pragmatica & Michael Ried…

Reports

Anthropic - System Card: Claude Mythos Preview

This System Card describes Claude Mythos Preview, a large language model from Anthropic. Claude Mythos Preview is our most capable frontier model to d…

NIST Challenges to the Monitoring of Deployed AI Systems March 2026

As artificial intelligence (AI) is integrated into commercial and government applications, there is growing demand to monitor these systems after epl…

Research Studies

WEF - Global Cybersecurity Outlook 2026

Executive Summary Cybersecurity in 2026 is accelerating amid growing threats, geopolitical fragmentation and a widening technological divide. Artifici…

Trend Report

Interpol Global Financial Fraud Threat Assessement

This second edition of the INTERPOL Global Financial Fraud Threat Assessment examines how the fraud landscape has evolved over the past two years, hig…

Whitepapers

WEF - Organizational Transformation in the Age of AI March 2026

Artificial intelligence (AI) is entering a decisive phase. Across industries and regions, organizations are moving beyond experimentation and demonstr…

WEF Elevating Cybersecurity Ensuring Strategic and Sustainable Impact for CISOs Oct. 2025

This white paper explores the evolution of the CISO role in the face of rising complexity, outlining how this complexity manifests, what it demands of…

image

Contact Us

Security Interest Group Switzerland
c/o Bridge Head AG
Sulzbergstrasse 34
5430 Wettingen
Switzerland

Follow Us

This website is powered by
ToucanTech