Security Technology & Operations

Design a Tabletop Exercise to Support Your Security Operation – Inject Examples

Info-Tech has developed a portfolio of inject examples that members can leverage to get started and build upon in order to implement their own tabletop exercise capability.

Design a Tabletop Exercise to Support Your Security Operation – Phase 3: Develop

In order to ensure a seamless and well facilitated tabletop exercise, time needs to be dedicated to create briefings, guides, reports, and exercise injects.

Design a Tabletop Exercise to Support Your Security Operation – Phase 2: Design

To properly design a tabletop exercise, organizations must review their existing threat landscape and incident history in order to identity topics, scope, objectives.

Design a Tabletop Exercise to Support Your Security Operation – Phase 1: Plan

Tabletop planning starts with the evaluation of needs to ensure proper execution.

Security Operations Preliminary Maturity Assessment Tool

At a high level, assess your organization’s operational maturity in each of the threat collaboration environment functions. Determine whether the foundational processes...

Build a Cloud Security Strategy – Phase 2: Prioritize Initiatives and Construct a Roadmap

This phase of the blueprint Build an Cloud Security Strategy will help you prioritize and roadmap action items to better secure the cloud.

Develop a Security Operations Strategy – Phase 3: Define Operational Interdependencies

Formalize all operational initiatives by developing a sourcing strategy, measurement program, and implementation roadmap unique to your organization.

Concept of Operations Maturity Assessment Tool

The Concept of Operations Maturity Assessment Tool will help you systematically understand your current security state. Based on Info-Tech's maturity model, evaluate the...

Develop a Security Operations Strategy – Phase 2: Develop Maturity Initiatives

Begin developing and prioritizing gap initiatives in order to achieve the optimal state of operations.

Develop a Security Operations Strategy – Phases 1-3

Threat management has become resource-intensive, requiring continuous monitoring, collection, and analysis of significant volumes of event data. Implement a next-gen...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us