Build a Vendor Security Assessment Service

Risks from third parties are on the rise, but many organizations still struggle with how to tackle this problem. A risk-based approach is needed to manage supply chain...
  • guided implementation icon

Risk Management Case Study of a Global Chemical Manufacturing Firm

An Asian-headquartered chemical manufacturing organization with an 80-year history and facilities in over 20 countries wants to assess IT risks for its operations in the...

Security Incident Communications Guidelines and Templates

Use these guidelines and templates to help draft your organization's communications plan.

Security Incident Communications Policy Template

Use this policy template to help define your organization's procedures and expectations surrounding incident response communications.

Security Incident Response Interdepartmental Communications Template

Use this template to facilitate communication between the various departments that make up the Security Incident Response Team.

Master Your Security Incident Response Communications Program – Phase 2: Develop Your Communications Plan

This phase of the blueprint, Master Your Security Incident Response Communications Program, will help you to develop strategies for both internal and external communications.

Master Your Security Incident Response Communications Program – Phase 1: Dive Into Communications Planning

This phase of the blueprint, Master Your Security Incident Response Communications Program, will help you understand the benefits and challenges and get the...

Design a Tabletop Exercise to Support Your Security Operation – Phase 1: Plan

Tabletop planning starts with the evaluation of needs to ensure proper execution.

Design a Tabletop Exercise to Support Your Security Operation – Phase 3: Develop

In order to ensure a seamless and well facilitated tabletop exercise, time needs to be dedicated to create briefings, guides, reports, and exercise injects.

Design a Tabletop Exercise to Support Your Security Operation – Phase 2: Design

To properly design a tabletop exercise, organizations must review their existing threat landscape and incident history in order to identity topics, scope, objectives.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us