Vendor Security Process Diagram

This visual flowchart will guide you through the steps of engaging with vendors.

Security Operations Policy

The purpose of this policy is to set the requirements for proper facilitation and operation of the security operations program.

Vendor Security Process Template

Use this Word-based template to manage workflow, RACI matrices, and risk requirements.

Endpoint Protection Request for Proposal

A request for proposal is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of...

Zero Trust Security Benefit Assessment Tool

This tool helps an organization identify the major benefits and drivers for adopting a zero trust security strategy.

Security Operations Metrics Summary Document

Identify relevant metrics to assist in evaluating the success of your organization's incident response processes.

Cloud Security CAGI Tool

The Cloud Security CAGI Tool follows a custom framework in which an organization's cloud risk profile is analyzed to produce unique recommendations.

SIEM Appropriateness Tool

This tool helps the enterprise determine whether a SIEM solution is appropriate for the organization.

Build Your Security Operations Program From the Ground Up – Executive Brief

Security operations require a strategy because different processes need to collaborate and build upon each other to be effective. Read this Executive Brief to understand...

Security Incident Management Runbook: Malware

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us