Security Processes & Operations
Build Your Security Operations Program From the Ground Up
Establish security operations with a threat collaboration environment.
Contains: 6 PowerPoints, 4 Word Documents, and 4 Excel Tools
Develop a Security Operations Strategy
Transition from a security operations center to a threat collaboration environment.
Contains: 5 PowerPoints, 3 Word Documents, and 4 Excel Tools
Create a Disaster-Ready Ransomware Recovery Plan
Don’t let ransomware catch you off guard.
Contains: 6 PowerPoints, 2 Word Documents, 4 Excel Tools, 1 Visio Diagram, and 1 PDF Document
Optimize Security Mitigation Effectiveness Using STRIDE
Choose the right-sized security controls for your data value and risk exposure.
Contains: 9 PowerPoints, and 1 Excel Tool
Develop and Deploy Security Policies
Enhance your overall security posture with a defensible and prescriptive policy suite.
Contains: 5 PowerPoints, 17 Word Documents, and 2 Excel Tools
Establish an Effective System of Internal IT Controls to Mitigate Risks
The only thing worse than a lack of control is the illusion of control.
Contains: 1 PowerPoint, 3 Word Documents, 3 Excel Tools, and 5 Videos
Implement and Optimize an Effective Security Management Metrics Program
Make your security analytics useful for governing your business operations & security program.
Contains: 6 PowerPoints, 1 Word Document, and 1 Excel Tool
Forge an Ironclad Reporting Strategy for Security Metrics
Help the board understand what they need to know – no more, no less.
Contains: 3 PowerPoints, and 1 Excel Tool
Develop Your Security Outsourcing Strategy
Outsource the right functions, with the right MSSP.
Contains: 5 PowerPoints, 1 Word Document, and 2 Excel Tools
Understanding Regulation With Blockchain Technology
Is compliance really easier with blockchain?
Contains: 5 PowerPoints, 1 Word Document, and 1 Excel Tool
Embed Security Into the DevOps Pipeline
Shift security left to get into DevSecOps.
Contains: 4 PowerPoints, and 1 Word Document