Threat Intelligence & Incident Response - Templates & Policies

Ransomware Tabletop Planning Results – Example

Leverage tabletop planning to develop an effective and practical response plan that captures the steps staff in your organization would need to execute to prevent and...

Ransomware Response Runbook Template

Use this example as a starting point to document detailed ransomware response steps, from detection to recovery.

Ransomware Resilience Summary Presentation

Summarize your organization's current resilience and present a prioritized project roadmap to improve ransomware prevention and recovery capabilities.

Tabletop Exercise – Extended (Ransomware Template)

Adapt this tabletop planning session template to plan and practice the response of your leadership team to a ransomware scenario.

Security Incident Management Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Vulnerability Management Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Vulnerability Management Workflow

The workflows in the Standard Operating Procedure are provided in this raw working file for you to edit as needed.

Vulnerability Management SOP Template

As you are defining or improving your process, be sure to document it. This template provides a starting point in maintaining a detailed standard operating procedure.

Vulnerability Scanning Tool RFP Template

Looking for a vulnerability scanning tool? Use this Request for Proposal (RFP) template to get you started.

Penetration Test RFP Template

Looking to engage a vendor for a Penetration Test? Use this Request for Proposal (RFP) template to get you started.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us