Tabletop Exercises Package

Test your incident response communications plan by running these sample scenarios.

Vendor Security Process Diagram

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, to create a visual representation of your vendor due diligence process.

Integrate Threat Intelligence Into Your Security Operations

Organizations are struggling to get ahead of threats as they continue to respond reactively rather than proactively. Don’t be left behind. Develop a manageable and...
  • guided implementation icon

Vendor Security Process Template

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, to define your vendor due diligence process.

Security Incident Management Runbook: Credential Compromise

Incidents can be categorized into runbooks where a standardized response process is defined, eliminating inconsistency and ambiguity while increasing operational...

Security Incident Management Runbook: Malware

Incidents can be categorized into runbooks where a standardized response process is defined, eliminating inconsistency and ambiguity while increasing operational...

WikiLeaks – Vault 7 Releases

What do the Vault 7 releases mean for you? (And what do they NOT mean.)

Endpoint Protection Metrics Summary Template

Identify relevant metrics to assist in evaluating the success of your organization's endpoint protection process.

Security Incident Management RACI Tool

Assign responsibilities and deadlines for incident response and the management process.

Vendor Security Policy Template

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to define policy requirements for vendor security.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us