Ransomware Response Runbook Template

Use this example as a starting point to document detailed ransomware response steps, from detection to recovery.

Ransomware Threat Preparedness Workbook

Use this threat preparedness workbook to evaluate the threats and tactics in the ransomware kill chain using the MITRE framework and device-appropriate countermeasures.

Threat Landscape Briefing – December 2022

This monthly recording covers topics such as cyber threat and regulatory trends, nation states, cyber criminals, hacktivists campaigns, data breaches, control strategies...

Network and Communications Security Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Human Resource Security Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Physical and Environmental Security Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Endpoint Security Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Security Threat Detection Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Information Security Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Security Incident Management Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us