Threat Intelligence & Incident Response - Templates & Policies

Threat Intelligence Alert Template

An alert educates internal stakeholders on gathered intelligence to better improve operations and guide high-level strategic decisions. It helps to communicate...

Vendor Security Process Diagram

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, to create a visual representation of your vendor due diligence process.

Endpoint Protection Metrics Summary Template

Identify relevant metrics to assist in evaluating the success of your organization's endpoint protection process.

Security Incident Management Runbook: Malware

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Risk Assessment Management Using COBIT 5

Engaging with Info-Tech to conduct a COBIT-based operations workshop on risk management was a natural next step.

Security Incident Management Runbook: Credential Compromise

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Threat Intelligence Management Plan Template

A management plan organizes the project so that you can make efficient and effective resource allocation decisions.

Security Incident Management Runbook: Data Breach

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Security Incident Management Runbook: Third-Party Incident

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Vulnerability Scanning Tool RFP Template

Looking for a vulnerability scanning tool? Use this Request for Proposal (RFP) template to get you started.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us