Threat Intelligence & Incident Response - Templates & Policies

Security Incident Management Runbook: Malicious Email

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Security Incident Management Runbook: Distributed Denial of Service

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.ni

Security Incident Management Runbook: Credential Compromise

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Security Incident Management Runbook: Data Breach

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Security Incident Management Runbook: Third-Party Incident

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Security Incident Management Runbook: Ransomware

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Security Incident Management Runbook: Malware

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Ransomware Payment Policy Template

Use this template to create a ransomware payment policy BEFORE you're faced with a difficult decision. This policy will guides your decision based on criteria you've...

One-Page Emergency Incident Response Plan

Use this tool to develop an emergency incident response plan on a single page.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us