Security Technology & Operations

Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 5: Build a Cloud Security Governance Program

This phase of the blueprint, Ensure Cloud Security in IaaS, PaaS, and SaaS Environments, will help you build the organizational structure of your cloud security...

Cloud Security Governance Program Template

Use this template to ensure the continued maintenance of your cloud program's security.

Security Incident Management Runbook: Third-Party Incident

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Security Incident Management Runbook: Data Breach

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Cybersecurity Priorities Checklist Tool

This tool will help you filter out controls from a predefined list of primary, secondary, and tertiary priority domains and help you visualize a final list of initiatives...

Build a Cloud Security Strategy – Phase 2: Prioritize Initiatives and Construct a Roadmap

This phase of the blueprint Build an Cloud Security Strategy will help you prioritize and roadmap action items to better secure the cloud.

Ransomware Project Roadmap Tool – Example

Identify specific tasks and projects to address gaps and improve your ability to prevent and respond to ransomware attacks.

Risk Assessment Management Using COBIT 5

Engaging with Info-Tech to conduct a COBIT-based operations workshop on risk management was a natural next step.

Build Your Security Operations Program From the Ground Up – Phases 1-4

Use this blueprint to establish your security operations program with a threat collaboration environment.

Security Governance and Management Metrics Tool

This tool will help you build a security metrics program.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us