Security Governance and Management Target State Framework and Gap Analysis

Use this tool to build your target state information security governance and management framework and conduct a gap analysis.

APT10 & Operation Cloud Hopper – Exposing a Global Cyberespionage Campaign

Your managed IT service providers may be leaving you vulnerable.

The Shadow Brokers – Details on Leaked Cyberintelligence Tools and Vulnerabilities

This Info-Tech briefing will provide a synopsis of what the Shadow Brokers leak might mean for users and organizations, and what actions can be taken in response to this...

Information Security Training Tool

Use this tool to determine your organization’s security training and awareness needs to begin building your training and awareness program.

IaaS and PaaS Service Level Agreement Template

Use this template to document the specific security requirements of your potential IaaS or PaaS vendor.

Security Governance and Management Metrics Tool

This tool will help you build a security metrics program.

WikiLeaks – Vault 7 Releases

What do the Vault 7 releases mean for you? (And what do they NOT mean.)

Secure Cloud Usage Policy

Use this template to outline how an organization’s end users can securely use cloud services through acceptable usage guidelines.

Endpoint Protection Metrics Summary Template

Identify relevant metrics to assist in evaluating the success of your organization's endpoint protection process.

Cloud Security CAGI Tool

The Cloud Security CAGI Tool follows a custom framework in which an organization's cloud risk profile is analyzed to produce unique recommendations.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us