Info-Tech has developed a portfolio of inject examples that members can leverage to get started and build upon in order to implement their own tabletop exercise capability.
|
|
Conduct a mock tabletop exercise.
|
|
In order to ensure continuous improvement, a plan needs to be developed to implement the development of the documentation of exercise findings, a discussion of lessons...
|
|
Identify specific tasks and projects to address gaps and improve your ability to prevent and respond to ransomware attacks.
|
|
This phase of the blueprint Build an Cloud Security Strategy will help you prioritize and roadmap action items to better secure the cloud.
|
|
Assign responsibilities to your data classification program.
|
|
This tool will help you filter out controls from a predefined list of primary, secondary, and tertiary priority domains and help you visualize a final list of initiatives...
|
|
This phase of the blueprint, Master Your Security Incident Response Communications Program, will help you understand the benefits and challenges and get the...
|
|
This blueprint will help you to develop an effective strategy for communicating with internal and external stakeholders during a security incident, as well as how to...
|
|
This phase of the blueprint, Master Your Security Incident Response Communications Program, will help you to develop strategies for both internal and external communications.
|
|