Security Technology & Operations

Design a Tabletop Exercise to Support Your Security Operation – Phases 1-5

The use of a Tabletop Exercises is an excellent way to test the effectiveness of an organizations overall security program, the investment of technology controls, and the...

Design a Tabletop Exercise to Support Your Security Operation – Executive Brief

Read our Executive Brief to understand why you should design a tabletop exercise to support your security operations to evaluate the effectiveness of your security...

Security Operations RACI Chart & Program Plan

Assign responsibilities and develop collaborative process flows for the security operations program.

Develop a Security Operations Strategy – Phase 3: Define Operational Interdependencies

Formalize all operational initiatives by developing a sourcing strategy, measurement program, and implementation roadmap unique to your organization.

Concept of Operations Maturity Assessment Tool

The Concept of Operations Maturity Assessment Tool will help you systematically understand your current security state. Based on Info-Tech's maturity model, evaluate the...

Discover and Classify Your Data – Phases 1-3

This storyboard will help you define and develop your data classification program, from formalizing the program to discovering your data and finally implementing data...

Vulnerability Scanning Tool RFP Template

Looking for a vulnerability scanning tool? Use this Request for Proposal (RFP) template to get you started.

Discover and Classify Your Data – Executive Brief

Read this Executive Brief to understand why data classification is an initiative for the entire organization and how this blueprint can help simplify the process.

Implement Risk-Based Vulnerability Management – Executive Brief

Read our concise Executive Brief to find out why you should design and implement a vulnerability management program, review Info-Tech’s methodology, and understand the...

Discover and Classify Your Data – Phase 1: Formalize the Classification Program

This phase of the blueprint will help you understand the importance of data classification and aid you in developing a classification scheme that meets your...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us