WikiLeaks – Vault 7 Releases

What do the Vault 7 releases mean for you? (And what do they NOT mean.)

Endpoint Protection Metrics Summary Template

Identify relevant metrics to assist in evaluating the success of your organization's endpoint protection process.

Security Incident Management RACI Tool

Assign responsibilities and deadlines for incident response and the management process.

Security Incident Management Runbook: Ransomware

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Tabletop Exercises Package

Test your incident response communications plan by running these sample scenarios.

Vendor Security Policy Template

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to define policy requirements for vendor security.

Vendor Security Process Template

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, to define your vendor due diligence process.

Vendor Security Process Diagram

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, to create a visual representation of your vendor due diligence process.

Security Pressure Posture Analysis Tool

Security pressure posture analysis helps your organization assess your real security context and enables your organization to invest in the right security functions while...

Information Security Training Tool

Use this tool to determine your organization’s security training and awareness needs to begin building your training and awareness program.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us