Security Technology & Operations

Mitigate Cyber Risks During the Russia-Ukraine Conflict

Review this publication for a summary of cyber risks related to the Russia-Ukraine conflict, nation-level and Info-Tech cyber-defense recommendations, and resources to...

Mobile Device Remote Wipe Waiver Template

Having the ability to remote wipe is one of the most basic tools in IT's arsenal for securing mobile devices. Use this remote wipe waiver template to create a document...

Threat Landscape Briefing – January 2022

This monthly recording covers topics such as cyber threat and regulatory trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control...

Log4Shell: Assess and Mitigate Your Exposure to This Critical Zero-Day

Read our Log4Shell summary report to better understand this critical zero-day exploit, how you might be affected, and what immediate action you can take.

Discover and Classify Your Data – Phase 1: Formalize the Classification Program

This phase of the blueprint will help you understand the importance of data classification and aid you in developing a classification scheme that meets your...

Discover and Classify Your Data – Executive Brief

Read this Executive Brief to understand why data classification is an initiative for the entire organization and how this blueprint can help simplify the process.

Discover and Classify Your Data – Phases 1-3

This storyboard will help you define and develop your data classification program, from formalizing the program to discovering your data and finally implementing data...

Discover and Classify Your Data – Phase 2: Discover the Data

This phase of the blueprint will help you perform and manage data discovery.

Discover and Classify Your Data – Phase 3: Classify the Data

This phase of the blueprint will help you assign proper classifications to your data and track meaningful metrics to continually improve the program.

Identity Security RACI Chart

A best-of-breed template to help you document roles and responsibilities related to identity security.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us