Security Governance and Management Communication Plan

This template will help you organize your various security communication efforts with different stakeholders.

Optimize Security Mitigation Effectiveness Using STRIDE – Phase 4: Control Maturity Assessment

This phase of the blueprint, Optimize Security Mitigation Effectiveness, will help you to catalogue your existing security controls and see how they address your existing...

Optimize Security Mitigation Effectiveness Using STRIDE – Phase 1: Setup – Data and Asset Classification

Start your mitigation effectiveness assessment by establishing a foundational data and IT system element classification from which to launch the assessment.

Operations Security Policy – ISO

The purpose of this policy is to ensure the secure operations of information processing facilities within and related to an organization.

Information Security Compliance Template

Use this template to manage your information security compliance requirements.

Optimize Security Mitigation Effectiveness Using STRIDE – Phase 6: Implementation and Maintenance

This phase of the Optimize Security Mitigation Effectiveness will help you to create a prioritized action plan based on your assessment, and plan to reassess and maintain...

Leverage Threat Intelligence for Your Organization in Five Steps

These five steps will take you through what you need to know to use threat intelligence to improve your organization’s overall security, no matter what your level of...

Manage Third-Party Service Security Outsourcing

A lack of time and resources prevent many CISOs and organizations from being able to enable security services and deliver them internally. In addition, there is not...
  • guided implementation icon

Implement Risk-Based Vulnerability Management – Phases 1-4

This is the main storyboard of a risk-based approach to vulnerability management and the reduction of your risk surface.

Optimize Security Mitigation Effectiveness Using STRIDE – Phase 5: Outputs and Interpretation

This phase of the blueprint, Optimize Security Mitigation Effectiveness, will help you to understand and interpret the results of the assessment and gain insight into how...
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us