Security Technology & Operations

Design a Tabletop Exercise to Support Your Security Operation – Inject Examples

Info-Tech has developed a portfolio of inject examples that members can leverage to get started and build upon in order to implement their own tabletop exercise capability.

Design a Tabletop Exercise to Support Your Security Operation – Phase 4: Conduct

Conduct a mock tabletop exercise.

Design a Tabletop Exercise to Support Your Security Operation – Phase 5: Evaluate

In order to ensure continuous improvement, a plan needs to be developed to implement the development of the documentation of exercise findings, a discussion of lessons...

Ransomware Project Roadmap Tool – Example

Identify specific tasks and projects to address gaps and improve your ability to prevent and respond to ransomware attacks.

Cybersecurity Priorities Checklist Tool

This tool will help you filter out controls from a predefined list of primary, secondary, and tertiary priority domains and help you visualize a final list of initiatives...

Data Classification RACI Tool

Assign responsibilities to your data classification program.

Security Incident Management Runbook: Data Breach

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Master Your Security Incident Response Communications Program – Phase 1: Dive Into Communications Planning

This phase of the blueprint, Master Your Security Incident Response Communications Program, will help you understand the benefits and challenges and get the...

Master Your Security Incident Response Communications Program – Phases 1-2

This blueprint will help you to develop an effective strategy for communicating with internal and external stakeholders during a security incident, as well as how to...

Master Your Security Incident Response Communications Program – Phase 2: Develop Your Communications Plan

This phase of the blueprint, Master Your Security Incident Response Communications Program, will help you to develop strategies for both internal and external communications.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us