Security Technology & Operations

Endpoint Protection Request for Proposal

A request for proposal is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of...

Cloud Security Communication Deck

Use this template to outline the organization’s security understanding and requirements of the proposed cloud migration.

Cloud Security CAGI Tool

The Cloud Security CAGI Tool follows a custom framework in which an organization's cloud risk profile is analyzed to produce unique recommendations.

SIEM Appropriateness Tool

This tool helps the enterprise determine whether a SIEM solution is appropriate for the organization.

Tabletop Exercises Package

Test your incident response communications plan by running these sample scenarios.

Vendor Security Questionnaire

Use this collection of workbooks to create a vendor security assessment for low, medium, and high-risk vendors.

Master Your Security Incident Response Communications Program – Phases 1-2

This blueprint will help you to develop an effective strategy for communicating with internal and external stakeholders during a security incident, as well as how to...

Service Risk Assessment Questionnaire

Use this Excel-based tool to develop a product/service risk assessment and assign a risk rating.

RBAC Implementation Workbook

Use this tool to build a role-based access control model for your organization. This tool also provides version control and metrics tabs to assist with long-term maintenance.

Master Your Security Incident Response Communications Program

Many organizations do not have an incident response plan, and those that do often forget to include a communications plan, leading to time loss while trying to create one...
  • guided implementation icon
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us