Prioritize the order in which threat intelligence needs are triaged based on the frequency and the impact of the potential threats.
|
|
Assign responsibilities to the threat management process.
|
|
The Threat Intelligence Maturity Assessment Tool will help you systematically understand your current security state. Based on Info-Tech's maturity model, evaluate the...
|
|
The Data Audit Scorecard identifies the areas in which the health of your data can be modified for improvement. Use this template to see where you fall short so you can...
|
|
Prioritize the order in which the security incident runbooks will be developed based on the frequency and the impact of the potential incidents.
|
|
Use this tool to help you quickly gauge your organization's current security incident management processes.
|
|
Use this template to help you determine the key questions that need to be answered at your post-incident review.
|
|
Quantify the business impact of a ransomware attack to communicate risk and prioritize the systems and data that need the greatest protection
|
|
Determine the risk of your vulnerabilities using an impact and likelihood measure based on the specifics of your organization and its applications and services.
|
|
Use this assessment tool to assess existing protection, detection, response, and recovery capabilities and identify potential improvements.
|
|