Ransomware Response Runbook Template

Use this example as a starting point to document detailed ransomware response steps, from detection to recovery.

Ransomware Response Workflow Template

This template provides a visual at-a-glance summary of the key steps and stakeholders in a sample ransomware incident response.

Threat Landscape Briefing – February 2021

This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals and hacktivists campaigns, data breaches, control...

Post-Incident Review Questions Tracking Tool

Use this template to help you determine the key questions that need to be answered at your post-incident review.

Respond to the SolarWinds Compromise

The extent and sophistication of this attack are staggering, and IT Security must be fully informed and take action immediately.

Threat Landscape Briefing – October 2020

This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals and hacktivists campaigns, data breaches, control...

Design a Coordinated Vulnerability Disclosure Program – Phase 2: Formalize the Program

This phase of the blueprint, Formalize the Program, will help you create a coordinated vulnerability disclosure policy and plan.

Coordinated Vulnerability Disclosure Policy

Use Info-Tech's Coordinated Vulnerability Disclosure Policy to specify the parameters of your program.

Design a Coordinated Vulnerability Disclosure Program

Businesses prioritize speed to market over secure coding and testing practices in the development lifecycle. As a result, vulnerabilities exist naturally in software but...
  • guided implementation icon

Design a Coordinated Vulnerability Disclosure Program – Executive Brief

Read this Executive Brief to understand why a coordinated vulnerability disclosure program is needed in today's modern security landscape.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us