Threat Intelligence & Incident Response - Templates & Policies

Security Incident Management Runbook: Malicious Email

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Ransomware Response Runbook Template

Use this example as a starting point to document detailed ransomware response steps, from detection to recovery.

Ransomware Response Workflow Template

This template provides a visual at-a-glance summary of the key steps and stakeholders in a sample ransomware incident response.

Tabletop Exercise – Extended (Ransomware Template)

Adapt this tabletop planning session template to plan and practice the response of your leadership team to a ransomware scenario.

Ransomware Resilience Summary Presentation

Summarize your organization's current resilience and present a prioritized project roadmap to improve ransomware prevention and recovery capabilities.

Ransomware Tabletop Planning Results – Example

Leverage tabletop planning to develop an effective and practical response plan that captures the steps staff in your organization would need to execute to prevent and...

Vulnerability Management SOP Template

As you are defining or improving your process, be sure to document it. This template provides a starting point in maintaining a detailed standard operating procedure.

Penetration Test RFP Template

Looking to engage a vendor for a Penetration Test? Use this Request for Proposal (RFP) template to get you started.

Vulnerability Management Workflow

The workflows in the Standard Operating Procedure are provided in this raw working file for you to edit as needed.

Vulnerability Scanning Tool RFP Template

Looking for a vulnerability scanning tool? Use this Request for Proposal (RFP) template to get you started.
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us