Threat Intelligence Prioritization Tool

Prioritize the order in which threat intelligence needs are triaged based on the frequency and the impact of the potential threats.

Threat Intelligence RACI Tool

Assign responsibilities to the threat management process.

Threat Intelligence Maturity Assessment Tool

The Threat Intelligence Maturity Assessment Tool will help you systematically understand your current security state. Based on Info-Tech's maturity model, evaluate the...

Data Audit Scorecard

The Data Audit Scorecard identifies the areas in which the health of your data can be modified for improvement. Use this template to see where you fall short so you can...

Security Incident Runbook Prioritization Tool

Prioritize the order in which the security incident runbooks will be developed based on the frequency and the impact of the potential incidents.

Security Incident Management Maturity Checklist ‒ Preliminary

Use this tool to help you quickly gauge your organization's current security incident management processes.

Post-Incident Review Questions Tracking Tool

Use this template to help you determine the key questions that need to be answered at your post-incident review.

Ransomware Business Impact Analysis Tool – Example

Quantify the business impact of a ransomware attack to communicate risk and prioritize the systems and data that need the greatest protection

Vulnerability Management Risk Assessment Tool

Determine the risk of your vulnerabilities using an impact and likelihood measure based on the specifics of your organization and its applications and services.

Ransomware Resilience Assessment

Use this assessment tool to assess existing protection, detection, response, and recovery capabilities and identify potential improvements.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us