Security Technology & Operations - Storyboard

Log4Shell: Assess and Mitigate Your Exposure to This Critical Zero-Day

Read our Log4Shell summary report to better understand this critical zero-day exploit, how you might be affected, and what immediate action you can take.

Discover and Classify Your Data – Phase 3: Classify the Data

This phase of the blueprint will help you assign proper classifications to your data and track meaningful metrics to continually improve the program.

Discover and Classify Your Data – Phases 1-3

This storyboard will help you define and develop your data classification program, from formalizing the program to discovering your data and finally implementing data...

Discover and Classify Your Data – Phase 1: Formalize the Classification Program

This phase of the blueprint will help you understand the importance of data classification and aid you in developing a classification scheme that meets your...

Discover and Classify Your Data – Phase 2: Discover the Data

This phase of the blueprint will help you perform and manage data discovery.

Assess and Govern Identity Security – Phases 1-2

A step-by-step document that walks you through how to properly inventory your identity types, repositories, threats, and mitigations.

Implement Risk-Based Vulnerability Management – Phases 1-4

This is the main storyboard of a risk-based approach to vulnerability management and the reduction of your risk surface.

Respond to the HAFNIUM-Microsoft Exchange Attack

The HAFNIUM attack on Microsoft Exchange has left organizations reeling, and information sources are somewhat confusing as to the seriousness of the attack, what one...

Create a Ransomware Incident Response Plan – Phases 1-4

Ransomware has the attention of every leadership team. The challenge is translating that attention into specific actions to improve your ransomware readiness.

Mature Your Identity and Access Management Program – Phases 1-3

This storyboard will help you improve the organization's identity and access management practices by using the Identity Lifecycle as a framework.
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us