Security Technology & Operations - Storyboard

Design a Tabletop Exercise to Support Your Security Operation – Phase 2: Design

To properly design a tabletop exercise, organizations must review their existing threat landscape and incident history in order to identity topics, scope, objectives.

Design a Tabletop Exercise to Support Your Security Operation – Phase 3: Develop

In order to ensure a seamless and well facilitated tabletop exercise, time needs to be dedicated to create briefings, guides, reports, and exercise injects.

Design a Tabletop Exercise to Support Your Security Operation – Phase 4: Conduct

Conduct a mock tabletop exercise.

Design a Tabletop Exercise to Support Your Security Operation – Phase 5: Evaluate

In order to ensure continuous improvement, a plan needs to be developed to implement the development of the documentation of exercise findings, a discussion of lessons...

Understanding Regulation With Blockchain Technology – Phases 1-2

Understand the implications of blockchain from a usage and forensic perspective, as well as the potential unique issues of this transformative technology.

Understanding Regulation With Blockchain Technology – Phase 1: How Blockchain Can Disrupt Data Reporting

Understand blockchain through a business-centric definition and discover use cases of blockchain across industries.

Understanding Regulation With Blockchain Technology – Phase 2: Build and Evaluate an Inventory of Use Cases

Envision how blockchain can enhance your organization’s key capabilities, determine whether blockchain aligns with your enterprise, and communication your findings to...

Master Your Security Incident Response Communications Program – Phase 2: Develop Your Communications Plan

This phase of the blueprint, Master Your Security Incident Response Communications Program, will help you to develop strategies for both internal and external communications.

Simplify Identity and Access Management – Phase 1: Audit and Classify Existing Data

This phase of the blueprint Simplify Identity and Access Management will assist you with auditing your user directory in order to lay the foundations for implementing a...

Simplify Identity and Access Management – Phases 1-4

This storyboard will help you lay the groundwork for establishing a centralized, effective, and efficient system for managing identity and access. Simplify your identity...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us