Security Technology & Operations - Tools

Security Policy Assessment Tool

The Security Policy Assessment Tool helps your organization prioritize your policy suite based on Importance, Ease to Implement, and Ease to Enforce.

Security Resources Planning Workbook

Use this tool to define your security team roles, FTE hours, security service portfolio, estimate service demand, and determine your overall resourcing needs

Identity Security Architecture Tool

A structured tool to help you inventory identity types, threats, and mitigations using the MITRE ATT&CK® framework.

Identity Security RACI Chart

A best-of-breed template to help you document roles and responsibilities related to identity security.

Vulnerability Tracking Tool

Remediation activity needs to be tracked, and this Excel-based file offers a starting point for you to do so.

Vulnerability Management Risk Assessment Tool

Determine the risk of your vulnerabilities using an impact and likelihood measure based on the specifics of your organization and its applications and services.

Ransomware Project Roadmap Tool – Example

Identify specific tasks and projects to address gaps and improve your ability to prevent and respond to ransomware attacks.

Ransomware Business Impact Analysis Tool – Example

Quantify the business impact of a ransomware attack to communicate risk and prioritize the systems and data that need the greatest protection

Post-Incident Review Questions Tracking Tool

Use this template to help you determine the key questions that need to be answered at your post-incident review.

Cloud Security Information Security Gap Analysis Tool

The Information Security Program Gap Analysis Tool will help you systematically understand your current security state.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us