Tagged - security roadmap

Build an Information Security Strategy for Small Enterprises

Build a business-aligned, risk-aware, holistic security strategy that is suited for your small enterprise: gather business requirements to prioritize improvements; assess...
  • guided implementation icon

Build an Information Security Strategy

Build a business-aligned, risk-aware, holistic security strategy: gather business requirements to prioritize improvements; assess risks, stakeholder expectations, and...
  • guided implementation icon

Information Security Steering Committee Charter

A charter is the organizational mandate that outlines the purpose, scope, and authority of the Information Security Steering Committee.

Threat Preparedness Using MITRE ATT&CK® – Phase 3: Execute Remediation and Detective Measures

This part of the blueprint Threat Preparedness Using MITRE ATT&CK® will help you plan your next threat modeling session with actionable remediation efforts.

Threat Preparedness Using MITRE ATT&CK®

Info-Tech has developed an approach to prioritizing the threat areas that are most pressing to your enterprise. Using the MITRE ATT&CK framework, identify the impact of...
  • guided implementation icon

Threat Preparedness Using MITRE ATT&CK® – Executive Brief

Read our concise Executive Brief to find out why threat preparedness is a crucial first step in defending your network against any attack type. Review Info-Tech’s...

Threat Preparedness Using MITRE ATT&CK® – Phase 1: Attack Tactics and Techniques

This phase of the blueprint Threat Preparedness Using MITRE ATT&CK® will help you understand all of the attack tactics and techniques that a malicious attacker may use to...

Threat Preparedness Using MITRE ATT&CK® – Phases 1-3

This storyboard will help you to adequately prepare against the tactics, techniques, and sub-techniques that a malicious attacker may use to gain access to and compromise...

Enterprise Threat Preparedness Workbook

Use the Enterprise Threat Preparedness Workbook to document your preparedness for each of the various attack tactics and techniques that an attacker may use. Choose the...

Threat Preparedness Using MITRE ATT&CK® – Phase 2: Threat Preparedness Workbook Mapping

This phase of the blueprint Threat Preparedness Using MITRE ATT&CK® will allow you to map your various security protocols against their impacts to understand how prepared...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us