Threat Landscape Briefing – October 2020

This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals and hacktivists campaigns, data breaches, control...

Respond to the SolarWinds Compromise

The extent and sophistication of this attack are staggering, and IT Security must be fully informed and take action immediately.

Threat Landscape Briefing – February 2021

This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals and hacktivists campaigns, data breaches, control...

Ransomware Business Impact Analysis Tool – Example

Quantify the business impact of a ransomware attack to communicate risk and prioritize the systems and data that need the greatest protection

Ransomware Response Workflow Template

This template provides a visual at-a-glance summary of the key steps and stakeholders in a sample ransomware incident response.

Ransomware Response Runbook Template

Use this example as a starting point to document detailed ransomware response steps, from detection to recovery.

Ransomware Tabletop Planning Results – Example

Leverage tabletop planning to develop an effective and practical response plan that captures the steps staff in your organization would need to execute to prevent and...

Ransomware Readiness Summary Presentation Template

Summarize your organization's current readiness and present a prioritized project roadmap to improve ransomware prevention and recovery capabilities.

Build Resilience Against Ransomware Attacks – Phases 1-4

Use this step-by-step guide to assess your ransomware readiness and implement controls that will improve your ability to prevent incursions and defend against ransomware...

Vengeful IT Contractor Shines Spotlight on Insider Threat Risk

IT can’t afford to ignore this security blind spot.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us