Security Technology & Operations

APT10 & Operation Cloud Hopper – Exposing a Global Cyberespionage Campaign

Your managed IT service providers may be leaving you vulnerable.

Physical Protection Policy – NIST

Use Info-Tech's Physical Security Policy to outline the measures taken to protect physical security.

Build Your Security Operations Program From the Ground Up

Use this blueprint to establish your security operations program with a threat collaboration environment.
  • guided implementation icon

Security Governance and Management Target State Framework and Gap Analysis

Use this tool to build your target state information security governance and management framework and conduct a gap analysis.

IAM System RFP Template

A request for proposal is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of...

Security Risk Register Tool

This tool will allow you to collect, analyze, and combine individual risks and view the aggregate level of risk within the organization, including how it compares to your...

Incident Response Policy – NIST

Use Info-Tech's Incident Response Policy to specify the parameters of your incident response program.

Develop and Implement a Security Incident Management Program

Security incidents are inevitable, but how they’re dealt with can make or break an organization. Poor incident response negatively affects business practices, including...
  • guided implementation icon

Security Incident Metrics Tool

Identify relevant metrics to assist in evaluating the success of your organization's incident response processes.

Contingency Planning Procedural Policy

Contingency plans are used to establish how information systems will continue to operate in the event of a catastrophic failure of the system or associated components.
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us