Security Technology & Operations

Vendor Security Process Template

Use this Word-based template to manage workflow, RACI matrices, and risk requirements.

Vendor Security Assessment Inventory

This Excel database maintains an inventory of all known vendors and the results of their last known security assessments.

Vendor Security Process Diagram

This visual flowchart will guide you through the steps of engaging with vendors.

Uptycs: Your Swiss Army Knife for CNAPP Solutions

As more organizations move to a cloud-first or hybrid deployment model, the protection of cloud-native applications is of the utmost importance. This tech note explores how...

Threat Landscape Briefing – April 2025

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control strategies and exposure...

Threat Landscape Briefing – March 2025

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, hacktivists campaigns, data breaches, control strategies, and exposure to...

Room for Risk – Moderate Security Scenario

An example tabletop scenario that can be used for a tabletop exercise.

Tabletop Scenario Generation Tool

A tool designed to help you leverage generative AI to produce realistic and relevant scenarios for a tabletop exercise.

Cross-Network Contagion – Moderate BCDR and Security Scenario

An example tabletop scenario that can be used for a tabletop exercise.

Stormfront Shutdown – Simple BCDR Scenario

An example tabletop scenario that can be used for a tabletop exercise.
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us