Security Operations - Tools

Security Risk Register Tool

This tool will allow you to collect, analyze, and combine individual risks and view the aggregate level of risk within the organization, including how it compares to your...

Risk Tolerance Determination Tool

This tool helps you determine micro and macro risk tolerance levels to understand whether individual projects and collective organizational risk exposure are within...

Insourcing vs. Outsourcing Costing Tool

This tool will help you determine the costs of outsourcing and in-house options to determine potential cost savings from outsourcing.

MSSP Selection Tool

This tool will rank managed security service providers (MSSPs) based on the variables selected in order to determine which MSSP is the most valuable to your organization.

Security Operations Preliminary Maturity Assessment Tool

At a high level, assess your organization’s operational maturity in each of the threat collaboration environment functions. Determine whether the foundational processes...

Concept of Operations Maturity Assessment Tool

The Concept of Operations Maturity Assessment Tool will help you systematically understand your current security state. Based on Info-Tech's maturity model, evaluate the...

Security Operations RACI Chart & Program Plan

Assign responsibilities and develop collaborative process flows for the security operations program.

Security Incident Runbook Prioritization Tool

Prioritize the order in which the security incident runbooks will be developed based on the frequency and the impact of the potential incidents.

Incident Response Maturity Assessment Tool

The Incident Response Maturity Assessment Tool will help you systematically understand your current security state. Based on Info-Tech's maturity model, evaluate the...

Security Policy Prioritization Tool

The Security Policy Prioritization Tool helps your organization prioritize your policy suite based on Importance, Ease to Implement and Ease to Enforce.
GET HELP Contact Us
×
VL Methodology