Security Technology & Operations

Endpoint Protection Metrics Summary Template

Identify relevant metrics to assist in evaluating the success of your organization's endpoint protection process.

Security Incident Management Runbook: Ransomware

Incidents can be categorized into runbooks where a standardized response process is defined, eliminating inconsistency and ambiguity while increasing operational...

Simplify Identity and Access Management – Phase 3: Create an RBAC Maintenance Plan

This phase of the blueprint Simplify Identity and Access Management covers best practices regarding exception handling and maintaining the RBAC system over time.

WikiLeaks – Vault 7 Releases

What do the Vault 7 releases mean for you? (And what do they NOT mean.)

Vendor Security Process Diagram

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, to create a visual representation of your vendor due diligence process.

Vulnerability Tracking Tool

Remediation activity needs to be tracked, and this Excel-based file offers a starting point for you to do so.

Simplify Identity and Access Management

This research will lay the groundwork for establishing a centralized, effective, and efficient system for managing identity and access. We will help organizations take...
  • guided implementation icon

Vendor Security Policy Template

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to define policy requirements for vendor security.

Develop a Security Operations Strategy – Executive Brief

Read our Executive Brief to understand why you should transition from a security operations center to a threat collaboration environment.

Vendor Security Process Template

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, to define your vendor due diligence process.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us