Select and Implement a Next Generation Endpoint Protection Solution – Phase 2: Select an Endpoint Protection Solution

Streamline the endpoint procurement process by identifying the vendor that best satisfies the use-case criteria.

Select and Implement a Next Generation Endpoint Protection Solution – Phase 3: Implement and Manage Your Endpoint Protection Solution

Prepare for the EPP implementation and measure the value of the solution.

Optimize Security Mitigation Effectiveness Using STRIDE – Phases 1-6

Use Info-Tech's unique and powerful process to assess your organization's threat landscape and security controls to create an insightful and actionable plan to optimize...

Optimize Security Mitigation Effectiveness Using STRIDE – Phase 1: Setup – Data and Asset Classification

Start your mitigation effectiveness assessment by establishing a foundational data and IT system element classification from which to launch the assessment.

Optimize Security Mitigation Effectiveness Using STRIDE – Phase 2: Data and Element Inventory

This phase of the Optimize Security Mitigation Effectiveness blueprint will help you to perform data discovery to identify critical information and where it flows.

Optimize Security Mitigation Effectiveness Using STRIDE – Phase 3: Threat Severity Assessment

This phase of the Optimize Security Mitigation Effectiveness blueprint will help you to assess your systems threat landscape and perform a quantified threat severity analysis.

Optimize Security Mitigation Effectiveness Using STRIDE – Phase 4: Control Maturity Assessment

This phase of the blueprint, Optimize Security Mitigation Effectiveness, will help you to catalogue your existing security controls and see how they address your existing...

Optimize Security Mitigation Effectiveness Using STRIDE – Phase 5: Outputs and Interpretation

This phase of the blueprint, Optimize Security Mitigation Effectiveness, will help you to understand and interpret the results of the assessment and gain insight into how...

Optimize Security Mitigation Effectiveness Using STRIDE – Phase 6: Implementation and Maintenance

This phase of the Optimize Security Mitigation Effectiveness will help you to create a prioritized action plan based on your assessment, and plan to reassess and maintain...

Build a Business-Driven IT Risk Management Program – Phase 1: Review IT Risk Fundamentals and Governance

Review the foundations of IT risk management and establish a robust governance framework.
GET HELP Contact Us
×
VL Methodology