Mimecast Announces New Threat Intel Feed for Your Security Devices at Blackhat 2019

Mimecast announces a new threat intelligence platform at Blackhat 2019, offering customers a new means to feed threat intelligence into security devices such as SIEM,...

Panorays Gifts Its Customers a Mixed Blessing in Access to Shared Assessments Program Questionnaire

Panorays has announced a partnership with Shared Assessments to provide Panorays customers with access to the Standard Information Standard (SIG) questionnaire. This is...

BitSight Says Cyber Risk Ratings Are a Good Measure of Internal Risk – Is It Right?

BitSight Enterprise Analytics looks to increase the value proposition of using cyber risk ratings for internal risk management, but are they barking up the wrong tree? If...

Develop and Implement a Security Incident Management Program – Executive Brief

Effective and efficient management of incidents involves a formal process of preparation, detection, analysis, containment, eradication, recovery, and post-incident...

Security Incident Management Runbook: Malware

Incidents can be categorized into runbooks where a standardized response process is defined, eliminating inconsistency and ambiguity while increasing operational...

Develop and Implement a Security Incident Management Program

Security incidents are inevitable, but how they’re dealt with can make or break an organization. Poor incident response negatively affects business practices, including...
  • guided implementation icon

Security Incident Management Runbook: Third-Party Incident

Use this template to help you develop an incident-specific runbook and accompanying workflows.

Security Incident Management Runbook: Data Breach

Use this template to help you develop an incident-specific runbook and accompanying workflows.

Security Incident Management Runbook: Ransomware

Incidents can be categorized into runbooks where a standardized response process is defined, eliminating inconsistency and ambiguity while increasing operational...

Develop and Implement a Security Incident Management Program – Phase 1: Prepare

Prepare your organization for incident response with formal documentation of policies and processes, and a list of prioritized incidents.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us