Security Technology & Operations

Using PKI Jiu-Jitsu to Build a Powerful Digital Trust Ecosystem

In 2020, Google and Apple shortened TLS/SSL certificate lifecycle policies to 13 months. In March of 2023, Google once again proposed updates to its Certificate Lifecycle...

Your Internet Secret Service, Otherwise Known as External Attack Surface Management (EASM)

Have you ever thought of what else you could do to take your security operations center (SOC) to the next level and focus on prevention? Look no further – external attack...

Ransomware Resilience Summary Presentation

Summarize your organization's current resilience and present a prioritized project roadmap to improve ransomware prevention and recovery capabilities.

Tabletop Exercise – Internal (Ransomware Template)

Adapt this tabletop planning session template to plan and practice the response of your internal IT team to a ransomware scenario.

Tabletop Exercise – Extended (Ransomware Template)

Adapt this tabletop planning session template to plan and practice the response of your leadership team to a ransomware scenario.

Leadership Guide for Extended Ransomware

Use this guide in conjunction with the project blueprint Build Resilience Against Ransomware Attacks and the associated tabletop planning session templates. We recommend...

Ransomware Resilience Assessment

Use this assessment tool to assess existing protection, detection, response, and recovery capabilities and identify potential improvements.

Threat Landscape Briefing – December 2022

This monthly recording covers topics such as cyber threat and regulatory trends, nation states, cyber criminals, hacktivists campaigns, data breaches, control strategies...

Secure Your Hybrid Workforce

The internet is the new corporate network opening organizations to more risks not protected by the current security stack. Using infotech methodology of zero trust is a...

Ransomware Threat Preparedness Workbook

Use this threat preparedness workbook to evaluate the threats and tactics in the ransomware kill chain using the MITRE framework and device-appropriate countermeasures.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us