Tool
CSIRTs Americas Baseline: Maturity Reference for OAS Member States CSIRTs
Authors
Year
- 2025
Description
- This document presents the CSIRTAmericas network’s new resource: “SIM3 CSIRTAmericas Baseline”…
CSIRTs Americas Baseline: Maturity Reference for OAS Member States CSIRTs
This document presents the CSIRTAmericas network’s new resource: “SIM3 CSIRTAmericas Baseline”, a maturity baseline developed from the SIM3 model2 created by the Open CSIRT Foundation (OCF), an internationally recognized model for assessing the maturity of security teams. CSIRTAmericas Baseline serves to help organizations assess the readiness of their cyber incident […]
Tool
SIM3 Self Assessment Tool
Authors
Year
- 2022
Description
- The Open CSIRT Foundation developed an online self-assessment tool for SIM3. This tool is meant for …
SIM3 Self Assessment Tool
The Open CSIRT Foundation developed an online self-assessment tool for SIM3. This tool is meant for all types of CSIRTs. The tool assesses different aspects about the organisation, human (personnel), tools and processes aspects of a CSIRT.
Publication
Western Balkan CERT Cooperation
Authors
Year
- 2021
Description
- The objective of this report is to provide concrete proposals on possible approaches and models for…
Western Balkan CERT Cooperation
The objective of this report is to provide concrete proposals on possible approaches and models for enhanced cooperation among Western Balkans national CSIRTs based on the following main research questions: In which areas can national CSIRTs from the Western Balkans region cooperate with other nCSIRTs, but also other types of CSIRTs, from […]
Publication
SIM3: Security Incident Management Maturity Model
Authors
Year
- 2015
Description
- The topic here is the Maturity of SecurityIncident Management(SIM) rather than just “CSIRT” whic…
SIM3: Security Incident Management Maturity Model
The topic here is the Maturity of SecurityIncident Management(SIM) rather than just “CSIRT” which by virtue of the name is about “response” primarily. SIM has four major pillars: Prevention Detection Resolutiono Quality control & feedback The primary scope here is IT & information security incidents: incidents thatare limited to computers, […]






