Security Technology & Operations - Templates & Policies

Autonomous Security Delivery Roadmap Template

Use this deck as the starting point to present your completed list of prioritized and sequenced initiatives that have been vetted through a series of activities to...

Authentication Strategy Communication Deck

A communication template that will help you present your authentication roadmap and strategy to your executives. 

Authentication Standard Template

A standard template that will assist with the execution of your authentication policies.

Authentication Policy Template

A policy template that can be leveraged to assist with the implementation of your authentication roadmap 

Security Incident Management Runbook: Malware

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Security Incident Management Runbook: Ransomware

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Security Incident Management Runbook: Data Breach

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Security Incident Management Runbook: Third-Party Incident

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Security Incident Management Runbook: Distributed Denial of Service

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.ni

Security Incident Management Runbook: Credential Compromise

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us