Security Technology & Operations

Design a Tabletop Exercise to Support Your Security Operation – Inject Examples

Info-Tech has developed a portfolio of inject examples that members can leverage to get started and build upon in order to implement their own tabletop exercise capability.

Design a Tabletop Exercise to Support Your Security Operation – Phase 4: Conduct

Conduct a mock tabletop exercise.

Design a Tabletop Exercise to Support Your Security Operation – Phases 1-5

The use of a Tabletop Exercises is an excellent way to test the effectiveness of an organizations overall security program, the investment of technology controls, and the...

Design a Tabletop Exercise to Support Your Security Operation – Executive Brief

Read our Executive Brief to understand why you should design a tabletop exercise to support your security operations to evaluate the effectiveness of your security...

Design a Tabletop Exercise to Support Your Security Operation – Phase 5: Evaluate

In order to ensure continuous improvement, a plan needs to be developed to implement the development of the documentation of exercise findings, a discussion of lessons...

Security Architecture Recommendation Tool

This tool guides organizations in evaluating the complexity of their IT environment, their operational maturity, and the perceived value of security architecture. It then...

Security Operations RACI Chart & Program Plan

Assign responsibilities and develop collaborative process flows for the security operations program.

Master Your Security Incident Response Communications Program – Executive Brief

Read this executive brief to understand why communications planning needs to part of your incident response plan.

Master Your Security Incident Response Communications Program

Many organizations do not have an incident response plan, and those that do often forget to include a communications plan, leading to time loss while trying to create one...
  • guided implementation icon

Master Your Security Incident Response Communications Program – Phases 1-2

This blueprint will help you to develop an effective strategy for communicating with internal and external stakeholders during a security incident, as well as how to...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us