Build Resilience Against Ransomware Attacks – Phases 1-4

Use this step-by-step guide to assess your ransomware readiness and implement controls that will improve your ability to prevent incursions and defend against ransomware...

Vengeful IT Contractor Shines Spotlight on Insider Threat Risk

IT can’t afford to ignore this security blind spot.

Vulnerability Management SOP Template

As you are defining or improving your process, be sure to document it. This template provides a starting point in maintaining a detailed standard operating procedure.

Security Incident Runbook Prioritization Tool

Prioritize the order in which the security incident runbooks will be developed based on the frequency and the impact of the potential incidents.

Vulnerability Management Risk Assessment Tool

Determine the risk of your vulnerabilities using an impact and likelihood measure based on the specifics of your organization and its applications and services.

Vulnerability Management Workflow

The workflows in the Standard Operating Procedure are provided in this raw working file for you to edit as needed.

To SIEM or Not to SIEM?

Information security leaders fully understand the importance of having a security incident and event management (SIEM) solution, but teams need to overcome three main...

Leverage Threat Intelligence for Your Organization in Five Steps

These five steps will take you through what you need to know to use threat intelligence to improve your organization’s overall security, no matter what your level of...

Vulnerability Management Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Threat Landscape Briefing – April 2021

This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals and hacktivists campaigns, data breaches, control...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us