Security Technology & Operations

Design a Tabletop Exercise to Support Your Security Operation – Phase 2: Design

To properly design a tabletop exercise, organizations must review their existing threat landscape and incident history in order to identity topics, scope, objectives.

Master Your Security Incident Response Communications Program – Executive Brief

Read this executive brief to understand why communications planning needs to part of your incident response plan.

Design a Tabletop Exercise to Support Your Security Operation – Phase 1: Plan

Tabletop planning starts with the evaluation of needs to ensure proper execution.

Data Classification RACI Tool

Assign responsibilities to your data classification program.

Look Beyond Traditional Network Access Control

NAC has grown beyond its original purpose to become known as Security Automation and Orchestration (SA&O). The future of access control lies in individual use cases....

Demisto Acquired by Palo Alto Networks for $560M

Security orchestration, automation, and response (SOAR) firm, Demisto, was acquired by Palo Alto Networks in March as Palo Alto aims to strengthen its commitment to...

Design a Tabletop Exercise to Support Your Security Operation – Phase 5: Evaluate

In order to ensure continuous improvement, a plan needs to be developed to implement the development of the documentation of exercise findings, a discussion of lessons...

Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 4: Implement Your Secure Cloud Program

This phase of the blueprint, Ensure Cloud Security in IaaS, PaaS, and SaaS Environments, will help you turn your security requirements into specific tasks and develop...

Identify Opportunities to Mature the Security Architecture

Organizations require an effective security architecture in order to connect security to the business. This blueprint demonstrates Info-Tech’s approach to evaluating the...
  • guided implementation icon

ADP – Integrating Automation of Human Capital Management With Identity Access Management

Streamlining functionality and workflows of human capital management (HCM) systems while ensuring a rigorous level of security can be challenging. ADP prides itself on...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us