Identify specific tasks and projects to address gaps and improve your ability to prevent and respond to ransomware attacks.
|
|
Engaging with Info-Tech to conduct a COBIT-based operations workshop on risk management was a natural next step.
|
|
This tool will help you build a security metrics program.
|
|
Eliminate the security risks of Shellshock quickly. A brief research note for Info-Tech’s members.
|
|
This tool helps the enterprise determine whether a SIEM solution is appropriate for the organization.
|
|
Remediation activity needs to be tracked, and this Excel-based file offers a starting point for you to do so.
|
|
Organizations are struggling to get ahead of threats as they continue to respond reactively rather than proactively. Don’t be left behind. Develop a manageable and...
|
|
Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.
|
|
Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.
|
|
An alert educates internal stakeholders on gathered intelligence to better improve operations and guide high-level strategic decisions. It helps to communicate...
|
|