All Research

Threat Intelligence Maturity Assessment Tool

The Threat Intelligence Maturity Assessment Tool will help you systematically understand your current security state. Based on Info-Tech's maturity model, evaluate the...

Threat Intelligence Project Charter Template

Management buy-in is key to establishing an effective threat intelligence program. The approval indicates that security is top-of-mind and that the process aligns with...

Threat Intelligence RACI Tool

Assign responsibilities to the threat management process.

Threat Intelligence Management Plan Template

A management plan organizes the project so that you can make efficient and effective resource allocation decisions.

Threat Intelligence Policy Template

The purpose of this policy is to set the requirements for proper facilitation and operation of the threat intelligence program.

Threat Intelligence Prioritization Tool

Prioritize the order in which threat intelligence needs are triaged based on the frequency and the impact of the potential threats.

Threat Intelligence RFP MSSP Template

An RFP is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of requirements.

Threat Intelligence Malware Runbook Template

Threats can be categorized into runbooks for which a standardized response process can be defined, eliminating inconsistency and ambiguity while increasing operational...

Threat Intelligence Alert Template

An alert educates internal stakeholders on gathered intelligence to better improve operations and guide high-level strategic decisions. It helps to communicate...

Rebalance Project Intake for Small Enterprise

Successful project intake doesn't require additional time, administrative overhead, or high PPM maturity. Build intake discipline one step at a time by adopting a...
  • guided implementation icon
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us