Threat Preparedness Using MITRE ATT&CK® – Executive Brief

Read our concise Executive Brief to find out why threat preparedness is a crucial first step in defending your network against any attack type. Review Info-Tech’s...

Threat Preparedness Using MITRE ATT&CK® – Phase 1: Attack Tactics and Techniques

This phase of the blueprint Threat Preparedness Using MITRE ATT&CK® will help you understand all of the attack tactics and techniques that a malicious attacker may use to...

Threat Preparedness Using MITRE ATT&CK® – Phase 2: Threat Preparedness Workbook Mapping

This phase of the blueprint Threat Preparedness Using MITRE ATT&CK® will allow you to map your various security protocols against their impacts to understand how prepared...

Enterprise Threat Preparedness Workbook

Use the Enterprise Threat Preparedness Workbook to document your preparedness for each of the various attack tactics and techniques that an attacker may use. Choose the...

Threat Preparedness Using MITRE ATT&CK® – Phase 3: Execute Remediation and Detective Measures

This part of the blueprint Threat Preparedness Using MITRE ATT&CK® will help you plan your next threat modeling session with actionable remediation efforts.

Identify the Components of Your Cloud Security Architecture – Phase 3: Cloud Security Architecture Mapping

This part of the blueprint Identify the Components of Your Cloud Security Architecture will serve as a repository of information about your approach to securing the cloud...

Identify the Components of Your Cloud Security Architecture – Phase 4: Cloud Security Strategy Planning

This part of the blueprint Identify the Components of Your Cloud Security Architecture explores additional considerations when moving to the cloud – in particular, the...

Cloud Security Architecture Communication Deck

Socialize your findings to executive stakeholders and decision makers with a customizable, prepopulated communication deck. Explain the risks and the security services that...

Cloud Security Architecture Reference Model

Plot your findings from the Workbook and Archive Document to see the current state of your cloud security architecture, the risks, and where you still need to go.

Cloud Security Architecture Workbook

Use the Cloud Security Architecture Workbook to understand the risks, effort and mitigating services that you can use when moving your workloads to the cloud. The process...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us