Security Technology & Operations - Tools

Security Resources Planning Workbook

Use this tool to define your security team roles, FTE hours, security service portfolio, estimate service demand, and determine your overall resourcing needs

Identity Security Architecture Tool

A structured tool to help you inventory identity types, threats, and mitigations using the MITRE ATT&CK® framework.

Identity Security RACI Chart

A best-of-breed template to help you document roles and responsibilities related to identity security.

Vulnerability Tracking Tool

Remediation activity needs to be tracked, and this Excel-based file offers a starting point for you to do so.

Vulnerability Management Risk Assessment Tool

Determine the risk of your vulnerabilities using an impact and likelihood measure based on the specifics of your organization and its applications and services.

Ransomware Project Roadmap Tool – Example

Identify specific tasks and projects to address gaps and improve your ability to prevent and respond to ransomware attacks.

Ransomware Business Impact Analysis Tool – Example

Quantify the business impact of a ransomware attack to communicate risk and prioritize the systems and data that need the greatest protection

Post-Incident Review Questions Tracking Tool

Use this template to help you determine the key questions that need to be answered at your post-incident review.

Cloud Security Information Security Gap Analysis Tool

The Information Security Program Gap Analysis Tool will help you systematically understand your current security state.

KPI Development Worksheets

This tool will help you practice developing key performance indicators for various types of metrics based on your program's goals.
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us