Security Technology & Operations

Build Resilience Against Ransomware Attacks – Phases 1-4

Use this step-by-step guide to assess your ransomware readiness and implement controls that will improve your ability to prevent incursions and defend against ransomware...

Ransomware Resilience Assessment

Use this assessment tool to assess existing protection, detection, response, and recovery capabilities and identify potential improvements.

Ransomware Threat Preparedness Workbook

Use this threat preparedness workbook to evaluate the threats and tactics in the ransomware kill chain using the MITRE framework and device-appropriate countermeasures.

Threat Landscape Briefing – December 2022

This monthly recording covers topics such as cyber threat and regulatory trends, nation states, cyber criminals, hacktivists campaigns, data breaches, control strategies...

Information Security Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Application Security Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Security Awareness and Training Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Compliance and Audit Management Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Security Risk Management Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Cloud Security Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us