Security Technology & Operations

SIEM Appropriateness Tool

This tool helps the enterprise determine whether a SIEM solution is appropriate for the organization.

Develop Foundational Security Operations Processes – Phase 1: Assess Your Current State

Assess current prevention, detection, analysis, and response capabilities.

Security Operations Maturity Assessment Tool

The Security Operations Maturity Assessment Tool will help you systematically understand your current security state. Based on Info-Tech's maturity model, evaluate the...

Threat Landscape Briefing – April 2017

This monthly recording covers topics such as cyberthreat and regulatory trends, nation states, cybercriminals, and hacktivists campaigns, and more. Topics covered include...

Vendor Security Policy Template

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to define policy requirements for vendor security.

Vendor Security Process Template

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, to define your vendor due diligence process.

Vendor Security Process Diagram

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, to create a visual representation of your vendor due diligence process.

Threat Landscape Briefing – April 2019

This monthly recording covers topics such as cyber threat and regulatory trends, nation states, cyber criminals, hacktivists campaigns, data breaches, control strategies,...

Risk Assessment Management Using COBIT 5

Engaging with Info-Tech to conduct a COBIT-based operations workshop on risk management was a natural next step.

Vulnerability Mitigation Process Template

This template will allow you to build out the exact process that is needed in order to mitigate against vulnerabilities. This includes the identification, prioritization,...
GET HELP Contact Us
×
VL Methodology