Build a Zero Trust Roadmap – Phases 1-5

Use this storyboard to better understand the steps involved in building a roadmap for implementing zero trust.

Build a Zero Trust Roadmap

Move from a perimeter-based approach to security toward an “Always Verify” approach by creating a zero trust strategy and the roadmap to deploy it.
  • guided implementation icon

Guidelines for Compliance With Local Security and Privacy Laws Template

Use this template to develop guidelines for compliance with local security and privacy laws.

Digital Safety Guidelines for International Travel

Use this template to develop digital safety guidelines for international travel.

Jurisdictional Risk Register and Heat Map Tool

Use this Excel tool as the repository for security and privacy risks in high-risk jurisdictions. Describe the risk profile of key risk scenarios, analyze your risk...

Secure Operations in High-Risk Jurisdictions – Phases 1-3

Use this storyboard to build a process that will identify, assess, and address information security and privacy risks in high-risk jurisdictions.

Information Security Compliance Template

Use this template to manage your information security compliance requirements.

Threat Preparedness Using MITRE ATT&CK® – Phase 3: Execute Remediation and Detective Measures

This part of the blueprint Threat Preparedness Using MITRE ATT&CK® will help you plan your next threat modeling session with actionable remediation efforts.

Security Awareness Month Materials

October is Security Awareness Month and we’ve built four decks for you to share. Use these decks to remind your end users of security best practices.

Enterprise Threat Preparedness Workbook

Use the Enterprise Threat Preparedness Workbook to document your preparedness for each of the various attack tactics and techniques that an attacker may use. Choose the...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us