Risk Assessment Management Using COBIT 5

Engaging with Info-Tech to conduct a COBIT-based operations workshop on risk management was a natural next step.

CISO Development Plan Template

Once you have assessed your competency, process, and technology gaps, use this tool to set goals and create an action plan to remediate any gaps.

Security Incident Management Runbook: Ransomware

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Vulnerability Tracking Tool

Remediation activity needs to be tracked, and this Excel-based file offers a starting point for you to do so.

Fast Track Your GDPR Compliance Efforts

The GDPR enforcement deadline is here. Organizations must understand the risk of non-compliance and what the ramifications may mean for their reputation and future...
  • guided implementation icon

Business Requirement Security Strategy Mapping Tool

Use this tool to map business and IT initiatives to specific security mitigation controls. This tool is a documentation and mapping support tool as part of your larger...

Zero Trust Security Benefit Assessment Tool

This tool helps an organization identify the major benefits and drivers for adopting a zero trust security strategy.

Build Your Security Operations Program From the Ground Up – Phases 1-4

Use this blueprint to establish your security operations program with a threat collaboration environment.

Tabletop Exercises Package

Test your incident response communications plan by running these sample scenarios.

Security Threat and Risk Assessment Process Template

Use this template to document the overall process and structure of your security risk assessment program.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us