In this video, you will learn to describe various resources available to you to help your organization protect itself against cybercrime and cybercriminals. We started with the attack methodologies, but attack methodologies, of course, are something in data. I mean, if someone want to attack you, you need to understand what is the action of that possible attacker has. But there are a lot of information that of course needs to be understood and digest very well. Here, there are a couple of information that I would suggest to have a look, but I mean, there are many other information that you can go and start on the Internet and search for it. Information is very much important every single day. Usually, I try to understand what is happening today because this is something that is very much different from automation and security, and cyber security in general. On automation, you can survive, you can stay alive, you can keep your competency skill updated also without studying each single day. Cyber security unfortunately, every single days people develop new apps and apps that you need to be very well digested because if not, you cannot be protected by something that you don't know. Let's start with cyber crime or if you want, cyber security threat reports. Well, in IBM we have the X-Force report. X-Force is a report that is created by IBM cyber security research. So this three report, I would say, are very trusted reports and year after year, quarter after quarter, for some of these they update us the type of resource they recommend to download and always keep in mind. Then, there are also information that you can search, that provide to you some much more personalized information. So for example, in IBM we are exchanging X-Force Exchange. X-Force Exchange is a quarter, and this quarter, you can call the quarter with some specific IOC. So IP address, or [inaudible] the VM, hash file, email address, and you can see if this specific. X-Force when they talk to you, everything that they know about that specific IOC that you have acquired. Also, IBM make available a portal that provide you in a cyber security report that is very much specific to the sector, to the industry, to the country that you are going to. So for example, do you want to know if SQL injection is used in Italy? You can ask a report, the specific statistics on this, and then you can understand how this is important. That if you need to protect your client, or if you need to protect yourself, you want to understand if there are threats that are referring to that specific client, in that specific area. In this case, you could decide to spend this one cent, in patching that particular area. So for example, if you know that [inaudible] , and if you know that SQL injection is not very popular in the South of Italy. Well, you should start, you're worrying about protecting against SQL injection. Maybe you can invest something, this one cent on totally different stuff. Also, something that I would recommend to use is the data breach report. So that basically provides you the information on how much it can cost a data breach on a specific client. This is not cost you to the exact data, but of course, this is something that you can use either in case of selling or in case of, also, decide on where you want to invest your dollar. If you know that a data breach to yourself can cost a lot of million, or you got maybe like companies, protecting against that specific data breach is something.