Cyber Resilience is partnering with organizations who share our mission to enhance cyber leadership skills and drive cyber resilience. If you would like to partner with us or would like to suggest other organizations that we should partner with please contact us.

Global Cyber Alliance

Working to eradicate cyber risk

The Global Cyber Alliance (GCA) is, an international, cross-sector effort dedicated to eradicating cyber risk and improving our connected world. GCA focuses on reducing cyber risk by developing and deploying practical, real-world solutions that measurably improve our collective cybersecurity.



GCA Cybersecurity Toolkit


Global Cyber Alliance (GCA)



The Global Cyber Alliance (GCA) has built this toolkit for small to medium-sized businesses to address the Center for Internet Security Controls (CIS Controls) which will enable business owners to significantly reduce the cyber risks they face every day. The CIS Controls are a recommended set of actions, built and continuously updated using current threat information and expert guidance, for preventing and/or reducing the most common attacks in today’s cyber threat landscape. In fact, just addressing the first five CIS Controls can reduce your risk of cyber-attack by 85%.

Prevent Email Spoofing


DMARC/DMARC Risk Scanner


DMARC stands for Domain-based Message Authentication, Reporting and Conformance. It is the simple, trusted, free solution that brings together email authentication protocols, and adds reporting and compliance.







Block Malicious Domains


QUAD9


Quad9 routes your DNS queries through a secure network of servers around the globe. The system uses threat intelligence from more than a dozen of the industry’s leading cyber security companies to give a real-time perspective on what websites are safe and what sites are known to include malware or other threats. If the system detects that the site you want to reach is known to be infected, you’ll automatically be blocked from entry – keeping your data and computer safe.


High-Tech Bridge is a global provider of web and mobile Application Security Testing (AST) services. Their award-winning ImmuniWeb® Platform combines the genius of Human Intelligence with the power of Artificial Intelligence and Machine Learning.

Quick and cost effective risk assessment of all your internet facing applications

Immuniweb Discovery


Immuniweb Discovery uses a non-intrusive approach to quickly identify and provide information about your mobile and web applications available from the internet.


Free test of your Content Security Policy (CSP) and HTTP Security Headers

Immuniweb WebScan.


Free test of your Content Security Policy (CSP) and HTTP Security Headers




Find out if your servers comply with PCI DSS, HIPAA and NIST

Immuniweb SSL Scan


Find out if your servers comply with PCI DSS, HIPAA and NIST







Find typosquatted, cybersquatted or phishing websites abusing your brand

Immuniweb Trademark Monitor

Free and convenient tool to find typosquatted, cybersquatted or phishing websites abusing your brand


Protect yourself easily against Android and iOS vulnerabilities

Immuniweb Mobile App Scanner

Protect yourself easily against Android and iOS vulnerabilities


The LMNTRIX Adaptive Threat Response is a validated and integrated threat detection and response architecture that hunts down and eliminates the advanced and unknown threats that routinely bypass perimeter controls. Their cyberarsenal includes a combination of cutting-edge technology, leading intelligence, and advanced analytics which, when wielded by professionals with unparalleled expertise, allows them to detect and investigate the threats that others fail to even identify. Not only can they see the threats that others are blind to, we do so with great speed and accuracy.


Test effectiveness against known and unknown threats


LMNTRIX Threat Defense Assessment (TDA)”


The LMNTRIX Threat Defense Assessment (TDA) uses a non-intrusive approach to detect both known and unknown threats that routinely bypass perimeter controls. The TDA is the ideal solution to test the effectiveness of your existing security controls as well as the security monitoring and threat detection & response capability of your SOC and/or MSSP.


Continuous Monitoring, Hunting And Response


Continuous Monitoring, Hunting And Response


A global network of cyber defense centers with highly trained and certified intrusion analysts who provide constant vigilance and on-demand analysis of your networks. Our intrusion analysts monitor your networks and endpoints 24x7, applying the latest intelligence and proprietary methodologies to look for signs of compromise. When a potential compromise is detected, the team performs an in-depth analysis on affected systems to confirm the breach.


>