Integrate Threat Intelligence Into Your Security Operations – Phase 2: Design an Intelligence Collection Strategy

Design a threat intelligence collection strategy that best supports your organizational needs.

Threat Intelligence Prioritization Tool

Prioritize the order in which threat intelligence needs are triaged based on the frequency and the impact of the potential threats.

Threat Intelligence RFP MSSP Template

An RFP is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of requirements.

Integrate Threat Intelligence Into Your Security Operations – Phase 3: Optimize the Intelligence Analysis Process

Design a threat intelligence analysis process that complements your existing security operations.

Integrate Threat Intelligence Into Your Security Operations – Phase 4: Design a Collaboration and Feedback Program

Stand up an intelligence dissemination and feedback program.

Threat and Risk Assessment Tool

Use this tool to assess the threat and risk severity with any particular IT project or initiative.

Endpoint Protection TCO & ROI Comparison Calculator

Use this TCO and ROI calculator to compare costs and benefits when examining various endpoint protection solutions.

Endpoint Protection Roadmap & RACI Tool

Assign responsibilities and deadlines for the endpoint protection implementation and management process.

Petya/NOPetya – Addressing the Destructive Ransomware Attack

Protect yourself against the Petya/NOPetya ransomware attack.

Security Incident Management Runbook: Malicious Email

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us