No Surprise: New Survey Confirms That Most Organizations Are Ineffective at Third-Party Risk Management

A new report published by the Ponemon Institute confirms that organizations are spending an increasing amount on third-party risk management, but are failing to realize...

Proofpoint SOARs Above the Rest With Award-Winning Security Orchestration, Automation, and Response

Proofpoint’s Threat Response has claimed the Cybersecurity Excellent Awards Gold Winner for 2019 in the Incident Response category.

Security Incident Management Runbook: Third-Party Incident

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Security Incident Management Runbook: Data Breach

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Ransomware Project Roadmap Tool – Example

Identify specific tasks and projects to address gaps and improve your ability to prevent and respond to ransomware attacks.

Security Governance and Management Metrics Tool

This tool will help you build a security metrics program.

SIEM Appropriateness Tool

This tool helps the enterprise determine whether a SIEM solution is appropriate for the organization.

Vulnerability Tracking Tool

Remediation activity needs to be tracked, and this Excel-based file offers a starting point for you to do so.

Security Incident Management Runbook: Credential Compromise

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Security Incident Management Runbook: Malware

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us