Security Technology & Operations

Data Classification Standard

Use this template to thoroughly outline details of the data classification program, including classification levels, data handling requirements, and disclaimers.

Identify Opportunities to Mature the Security Architecture

Organizations require an effective security architecture in order to connect security to the business. This blueprint demonstrates Info-Tech’s approach to evaluating the...
  • guided implementation icon

Security Architecture Recommendation Tool

This tool guides organizations in evaluating the complexity of their IT environment, their operational maturity, and the perceived value of security architecture. It then...

Tabletop Exercises Package

Test your incident response communications plan by running these sample scenarios.

IAM Task Prioritization Tool

Use this tool to document and prioritize the tasks required to complete and implement the role-based access control model.

RBAC Implementation Workbook

Use this tool to build a role-based access control model for your organization. This tool also provides version control and metrics tabs to assist with long-term maintenance.

Simplify Identity and Access Management – Phases 1-4

This storyboard will help you lay the groundwork for establishing a centralized, effective, and efficient system for managing identity and access. Simplify your identity...

Master Your Security Incident Response Communications Program – Executive Brief

Read this executive brief to understand why communications planning needs to part of your incident response plan.

Master Your Security Incident Response Communications Program – Phase 1: Dive Into Communications Planning

This phase of the blueprint, Master Your Security Incident Response Communications Program, will help you understand the benefits and challenges and get the...

Master Your Security Incident Response Communications Program – Phases 1-2

This blueprint will help you to develop an effective strategy for communicating with internal and external stakeholders during a security incident, as well as how to...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us