Irish Information Security Forum



This resource provides some free open-source tools, methods, and guidance for identifying, detecting, and mitigating cyber threats, known vulnerabilities, and anomalies while operating a cloud or hybrid environment.

Malicious cyber actors target organizations, on-premises, and cloud environments, who may not possess the resources for defending against cyber threats. As organizations continue to advance into operations associated with cloud and cloud computing, this resource provides tools and guidance that can be used to help mitigate the risk of information theft, data encryption and extortion, and information exposure.


These tools can assist in hardening network environments/infrastructure, preventing malicious compromise, detecting malicious activity, mapping potential threat vectors, and identifying malicious activity post compromise.


The Cybersecurity Evaluation Tool (CSET) (CISA)
The Untitled Goose Tool (CISA)
Decider (CISA)
Memory Forensic on Cloud (JPCERT/CC)


If you are interested in finding out more about the IISF, or would like to attend one of our Chapter Meetings as an invited guest, please contact the
IISF Secretary:

By email:

By post:

David Cahill

Information Security

GPO, 1-117
D01 F5P2

Enhance your Cybersecurity knowledge and learn from those at the coalface of information Security in Ireland



We would like to thank these generous sponsors for their support. 

crowdstrike logo

zscaler logo



Sponsors are featured prominently throughout the IISF.IE website, social media channels as well as enjoying other benefits Read more


secured by edgescan digital security radar logo

© iiSf. All rights reserved. CRN: 3400036GH  - Privacy Statement  - Sponsorship  - Cybersecurity Ireland  - Produced by
LinkedIn Twitter