Security Technology & Operations

APT10 & Operation Cloud Hopper – Exposing a Global Cyberespionage Campaign

Your managed IT service providers may be leaving you vulnerable.

Build Your Security Operations Program From the Ground Up

Use this blueprint to establish your security operations program with a threat collaboration environment.
  • guided implementation icon

Security Governance and Management Target State Framework and Gap Analysis

Use this tool to build your target state information security governance and management framework and conduct a gap analysis.

Physical and Environmental Security Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Network and Communications Security Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Information Security Requirements Gathering Tool

Use the Information Security Requirements Gathering Tool to identify the organizational goals and compliance obligations that shape your security strategy and define its...

IaaS and PaaS Service Level Agreement Template

Use this template to document the specific security requirements of your potential IaaS or PaaS vendor.

Security Policy Prioritization Tool

The Security Policy Prioritization Tool helps your organization prioritize your policy suite based on Importance, Ease to Implement and Ease to Enforce.

Threat Intelligence Policy Template

The purpose of this policy is to set the requirements for proper facilitation and operation of the threat intelligence program.

Threat Intelligence Malware Runbook Template

Threats can be categorized into runbooks for which a standardized response process can be defined, eliminating inconsistency and ambiguity while increasing operational...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us