Security Technology & Operations

Design a Tabletop Exercise to Support Your Security Operation – Inject Examples

Info-Tech has developed a portfolio of inject examples that members can leverage to get started and build upon in order to implement their own tabletop exercise capability.

Design a Tabletop Exercise to Support Your Security Operation – Phase 4: Conduct

Conduct a mock tabletop exercise.

Design a Tabletop Exercise to Support Your Security Operation – Phase 5: Evaluate

In order to ensure continuous improvement, a plan needs to be developed to implement the development of the documentation of exercise findings, a discussion of lessons...

Ransomware Project Roadmap Tool – Example

Identify specific tasks and projects to address gaps and improve your ability to prevent and respond to ransomware attacks.

Build a Cloud Security Strategy – Phase 2: Prioritize Initiatives and Construct a Roadmap

This phase of the blueprint Build an Cloud Security Strategy will help you prioritize and roadmap action items to better secure the cloud.

Data Classification RACI Tool

Assign responsibilities to your data classification program.

Cybersecurity Priorities Checklist Tool

This tool will help you filter out controls from a predefined list of primary, secondary, and tertiary priority domains and help you visualize a final list of initiatives...

Master Your Security Incident Response Communications Program – Phase 1: Dive Into Communications Planning

This phase of the blueprint, Master Your Security Incident Response Communications Program, will help you understand the benefits and challenges and get the...

Master Your Security Incident Response Communications Program – Phases 1-2

This blueprint will help you to develop an effective strategy for communicating with internal and external stakeholders during a security incident, as well as how to...

Master Your Security Incident Response Communications Program – Phase 2: Develop Your Communications Plan

This phase of the blueprint, Master Your Security Incident Response Communications Program, will help you to develop strategies for both internal and external communications.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us