Security Technology & Operations

Vendor Security Policy Template

This in-depth template will help you tailor your vendor security policy to your organization.

Vulnerability Tracking Tool

Remediation activity needs to be tracked, and this Excel-based file offers a starting point for you to do so.

Vendor Security Process Diagram

This visual flowchart will guide you through the steps of engaging with vendors.

Simplify Identity and Access Management

This research will lay the groundwork for establishing a centralized, effective, and efficient system for managing identity and access. We will help organizations take back...
  • guided implementation icon

Security Incident Management Runbook: Credential Compromise

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Security Incident Management Runbook: Malware

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Build Your Security Operations Program From the Ground Up – Executive Brief

Security operations require a strategy because different processes need to collaborate and build upon each other to be effective. Read this Executive Brief to understand...

Vendor Security Process Template

Use this Word-based template to manage workflow, RACI matrices, and risk requirements.

Security Operations Collaboration Plan

The Security Operations Collaboration Plan identifies opportunities for optimization through collaboration and cross-training.

Security Incident Management RACI Tool

Assign responsibilities and deadlines for incident response and the management process.
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us