Simplify Identity and Access Management

This research will lay the groundwork for establishing a centralized, effective, and efficient system for managing identity and access. We will help organizations take back...
  • guided implementation icon

SIEM Appropriateness Tool

This tool helps the enterprise determine whether a SIEM solution is appropriate for the organization.

Secure Cloud Usage Policy

Use this template to outline how an organization’s end users can securely use cloud services through acceptable usage guidelines.

Develop a Security Operations Strategy – Executive Brief

Read our Executive Brief to understand why you should transition from a security operations center to a threat collaboration environment.

Tabletop Exercises Package

Test your incident response communications plan by running these sample scenarios.

Information Security Steering Committee Charter

A charter is the organizational mandate that outlines the purpose, scope, and authority of the Information Security Steering Committee.

Fast Track Your GDPR Compliance Efforts

The GDPR enforcement deadline is here. Organizations must understand the risk of non-compliance and what the ramifications may mean for their reputation and future revenue....
  • guided implementation icon

Business Requirement Security Strategy Mapping Tool

Use this tool to map business and IT initiatives to specific security mitigation controls. This tool is a documentation and mapping support tool as part of your larger...

Security Incident Management Runbook: Ransomware

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

CISO Development Plan Template

Once you have assessed your competency, process, and technology gaps, use this tool to set goals and create an action plan to remediate any gaps.
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us