Security Technology & Operations

Silent Intrusion – Complex BCDR and Security Scenario

An example tabletop scenario that can be used for a tabletop exercise.

Tabletop Scenario Template

A template to document a scenario to be used during tabletop exercises.

Room for Risk – Moderate Security Scenario

An example tabletop scenario that can be used for a tabletop exercise.

An Evaluation of Gurucul's Identity Security Analytics Platform

From the outset, Gurucul positioned itself as a pioneer in what would later be known as user and entity behavior analytics (UEBA). This early focus allowed Gurucul to...

Threat Landscape Briefing – February 2025

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control strategies and exposure...

SMBs and Cybersecurity: Finding the Right Help

Small and medium enterprises are worried about being attacked, but they underestimate the costs. A survey by Nationwide shows 69% of SMBs worry about cyberattacks, with...

Threat Landscape Briefing – January 2025

This monthly recording covers topics such as cyber threat trends, nation states, cybercriminals and hacktivists campaigns, data breaches, control strategies, and exposure...

Security Threat Detection Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Cloud Security Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Acceptable Use of Technology Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us