Ransomware Project Roadmap Tool – Example

Identify specific tasks and projects to address gaps and improve your ability to prevent and respond to ransomware attacks.

Risk Assessment Management Using COBIT 5

Engaging with Info-Tech to conduct a COBIT-based operations workshop on risk management was a natural next step.

Security Governance and Management Metrics Tool

This tool will help you build a security metrics program.

Don’t Be Shellshocked - Eliminate the Security Risks of Shellshock Quickly

Eliminate the security risks of Shellshock quickly. A brief research note for Info-Tech’s members.

SIEM Appropriateness Tool

This tool helps the enterprise determine whether a SIEM solution is appropriate for the organization.

Vulnerability Tracking Tool

Remediation activity needs to be tracked, and this Excel-based file offers a starting point for you to do so.

Integrate Threat Intelligence Into Your Security Operations

Organizations are struggling to get ahead of threats as they continue to respond reactively rather than proactively. Don’t be left behind. Develop a manageable and...
  • guided implementation icon

Security Incident Management Runbook: Credential Compromise

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Security Incident Management Runbook: Malware

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Threat Intelligence Alert Template

An alert educates internal stakeholders on gathered intelligence to better improve operations and guide high-level strategic decisions. It helps to communicate...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us