Security Technology & Operations

Cross-Network Contagion – Moderate BCDR and Security Scenario

An example tabletop scenario that can be used for a tabletop exercise.

Silent Intrusion – Complex BCDR and Security Scenario

An example tabletop scenario that can be used for a tabletop exercise.

Deepfake Disaster – Moderate Security Scenario

An example tabletop scenario that can be used for a tabletop exercise.

Threat Landscape Briefing – March 2025

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, hacktivists campaigns, data breaches, control strategies, and exposure to...

Threat Landscape Briefing – April 2025

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control strategies and exposure...

Build a Robust Security Architecture With Microsoft Technologies

The inherent complexity of Microsoft’s security stack often leaves users struggling to understand and fully leverage their value, resulting in underuse, redundancy, and a...
  • guided implementation icon

Build a Robust Security Architecture With Microsoft Technologies – Phases 1-4

A step-by-step framework for optimizing and rationalizing Microsoft security products in your organization.

Security Capability Assessment Workbook

A detailed Excel workbook designed to help you understand where you stand with your security capabilities.

Security Stack Capability Assessment Report

A concise presentation template designed to give you a detailed snapshot of your security capabilities.

Threat Landscape Briefing – May 2025

This monthly recording covers topics such as cyberthreat trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control strategies, and exposure...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us