Security Technology & Operations - Tools

Security Resources Planning Workbook

Use this tool to define your security team roles, FTE hours, security service portfolio, estimate service demand, and determine your overall resourcing needs

Identity Security RACI Chart

A best-of-breed template to help you document roles and responsibilities related to identity security.

Identity Security Architecture Tool

A structured tool to help you inventory identity types, threats, and mitigations using the MITRE ATT&CK® framework.

Ransomware Readiness Maturity Assessment Tool

Use this tool to determine your ransomware readiness, identify specific areas that need improvement, and define baseline metrics for measuring and reporting progress.

Vulnerability Tracking Tool

Remediation activity needs to be tracked, and this Excel-based file offers a starting point for you to do so.

Vulnerability Management Risk Assessment Tool

Determine the risk of your vulnerabilities using an impact and likelihood measure based on the specifics of your organization and its applications and services.

Ransomware Business Impact Analysis Tool – Example

Quantify the business impact of a ransomware attack to communicate risk and prioritize the systems and data that need the greatest protection

Ransomware Project Roadmap Tool – Example

Identify specific tasks and projects to address gaps and improve your ability to prevent and respond to ransomware attacks.

Post-Incident Review Questions Tracking Tool

Use this template to help you determine the key questions that need to be answered at your post-incident review.

IAM Initiative Tool

This tool will allow you to identify, document, prioritize, and roadmap initiatives for improving the organization's identity and access management practices.
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us