The toolkits are dynamic, vendor-agnostic clearinghouses of GCA-vetted tools and resources. GCA assesses tools for how they address specific standards from the Center for Internet Security®, Inc. (CIS®) Controls, the UK’s National Cyber Security Centre’s Cyber Essentials, and the Australia Cyber Security Centre’s Mitigation Strategies. All of these recommendations are globally recognized cybersecurity standards. A study from the SANS Institute shows that implementation of the top five CIS Controls can help organizations reduce their risk of common cyber attacks by as much as 85%.
Additional selection criteria include a description of the tool’s functionality, the level of IT knowledge required for use, and the time required to setup and/or use. Toolkit users may request additional information, and we incorporate input and feedback from the GCA Strategic Advisory Committee and key partners to continually inform future versions of the toolkits.
GCA includes third-party content (such as tools, resources, guides, and videos) as a service to users of the toolkits. However, toolkit users who access, use, or correspond or interact with third parties are solely between the user and the third party. GCA makes no representations or warranties regarding any third-party content or dealings. GCA reviews the tools included in the toolkits on a quarterly basis to determine if tools are still valid, free, and appropriate for the specific toolbox.
All tools and resources must meet our requirements, outlined in our Toolkit Selection Guidelines. If you would like to recommend a tool or resource that meets those requirements, please submit an application. For any other questions regarding tool or resource inclusion, please contact us at email@example.com.
For more detail, please see our Terms of Service.