Threat Intelligence & Incident Response
Topics
Types of Content
Integrate Threat Intelligence Into Your Security Operations – Phase 2: Design an Intelligence Collection StrategyDesign a threat intelligence collection strategy that best supports your organizational needs. |
|
Threat Intelligence Prioritization ToolPrioritize the order in which threat intelligence needs are triaged based on the frequency and the impact of the potential threats. |
|
Threat Intelligence RFP MSSP TemplateAn RFP is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of requirements. |
|
Integrate Threat Intelligence Into Your Security Operations – Phase 3: Optimize the Intelligence Analysis ProcessDesign a threat intelligence analysis process that complements your existing security operations. |
|
Integrate Threat Intelligence Into Your Security Operations – Phase 4: Design a Collaboration and Feedback ProgramStand up an intelligence dissemination and feedback program. |
|
Threat and Risk Assessment ToolUse this tool to assess the threat and risk severity with any particular IT project or initiative. |
|
Endpoint Protection TCO & ROI Comparison CalculatorUse this TCO and ROI calculator to compare costs and benefits when examining various endpoint protection solutions. |
|
Endpoint Protection Roadmap & RACI ToolAssign responsibilities and deadlines for the endpoint protection implementation and management process. |
|
Petya/NOPetya – Addressing the Destructive Ransomware AttackProtect yourself against the Petya/NOPetya ransomware attack. |
|
Security Incident Management Runbook: Malicious EmailAlign the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint. |
|