Info-Tech has developed a portfolio of inject examples that members can leverage to get started and build upon in order to implement their own tabletop exercise capability.
|
|
Conduct a mock tabletop exercise.
|
|
The use of a Tabletop Exercises is an excellent way to test the effectiveness of an organizations overall security program, the investment of technology controls, and the...
|
|
Read our Executive Brief to understand why you should design a tabletop exercise to support your security operations to evaluate the effectiveness of your security...
|
|
In order to ensure continuous improvement, a plan needs to be developed to implement the development of the documentation of exercise findings, a discussion of lessons...
|
|
This tool guides organizations in evaluating the complexity of their IT environment, their operational maturity, and the perceived value of security architecture. It then...
|
|
Assign responsibilities and develop collaborative process flows for the security operations program.
|
|
Read this executive brief to understand why communications planning needs to part of your incident response plan.
|
|
Many organizations do not have an incident response plan, and those that do often forget to include a communications plan, leading to time loss while trying to create one...
|
|
This blueprint will help you to develop an effective strategy for communicating with internal and external stakeholders during a security incident, as well as how to...
|
|