Use this tool to develop an emergency incident response plan on a single page.
|
|
This is the main storyboard of a risk-based approach to vulnerability management and the reduction of your risk surface.
|
|
This template will help you organize your various security communication efforts with different stakeholders.
|
|
This phase of the blueprint, Manage Third-Party Service Security Outsourcing,will help you identify different responsibilities and functions in your organization and...
|
|
This tool will help to identify content that should be covered by your security awareness and training program.
|
|
Prioritize the order in which the security incident runbooks will be developed based on the frequency and the impact of the potential incidents.
|
|
Use this template to manage your information security compliance requirements.
|
|
Use this tool to help prioritize your security requirement actions and to develop an action plan.
|
|
A lack of time and resources prevents your organization from being able to enable security internally, making outsourcing more appealing. An effective outsourcing partner...
|
|
This phase of the blueprint, Manage Third-Party Service Security Outsourcing, will help you understand how to align third-party providers to your organization.
|
|