Tagged - mitre att&ck

Assess and Govern Identity Security

Security leaders view modernizing identity security as too daunting and prefer to focus on narrower technology challenges. This limited focus is reactive and, in the long...
  • guided implementation icon

Assess and Govern Identity Security – Phases 1-2

A step-by-step document that walks you through how to properly inventory your identity types, repositories, threats, and mitigations.

Identity Security RACI Chart

A best-of-breed template to help you document roles and responsibilities related to identity security.

Identity Security Architecture Tool

A structured tool to help you inventory identity types, threats, and mitigations using the MITRE ATT&CK® framework.

Threat Preparedness Using MITRE ATT&CK®

Info-Tech has developed an approach to prioritizing the threat areas that are most pressing to your enterprise. Using the MITRE ATT&CK framework, identify the impact of...
  • guided implementation icon

Threat Preparedness Using MITRE ATT&CK® – Executive Brief

Read our concise Executive Brief to find out why threat preparedness is a crucial first step in defending your network against any attack type. Review Info-Tech’s...

Threat Preparedness Using MITRE ATT&CK® – Phases 1-3

This storyboard will help you to adequately prepare against the tactics, techniques, and sub-techniques that a malicious attacker may use to gain access to and compromise...

Threat Preparedness Using MITRE ATT&CK® – Phase 1: Attack Tactics and Techniques

This phase of the blueprint Threat Preparedness Using MITRE ATT&CK® will help you understand all of the attack tactics and techniques that a malicious attacker may use to...

Threat Preparedness Using MITRE ATT&CK® – Phase 2: Threat Preparedness Workbook Mapping

This phase of the blueprint Threat Preparedness Using MITRE ATT&CK® will allow you to map your various security protocols against their impacts to understand how prepared...

Enterprise Threat Preparedness Workbook

Use the Enterprise Threat Preparedness Workbook to document your preparedness for each of the various attack tactics and techniques that an attacker may use. Choose the...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us