Webinar: Create a Ransomware Incident Response Plan

Don’t be the next headline. Determine your current readiness, response plan, and projects to close gaps.

Webinar: Implement Risk-Based Vulnerability Management

Vulnerabilities will always exist. Addressing these will consume your department’s time and resources, and your efforts will quickly become stale as new vulnerabilities...

Threat Landscape Briefing – April 2021

This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals and hacktivists campaigns, data breaches, control...

To SIEM or Not to SIEM?

Information security leaders fully understand the importance of having a security incident and event management (SIEM) solution, but teams need to overcome three main...

Implement Risk-Based Vulnerability Management

Vulnerabilities will always exist. Addressing these will consume your department’s time and resources, and your efforts will quickly become stale as new vulnerabilities...
  • guided implementation icon

Implement Risk-Based Vulnerability Management – Phases 1-4

This is the main storyboard of a risk-based approach to vulnerability management and the reduction of your risk surface.

Vulnerability Tracking Tool

Remediation activity needs to be tracked, and this Excel-based file offers a starting point for you to do so.

Penetration Test RFP Template

Looking to engage a vendor for a Penetration Test? Use this Request for Proposal (RFP) template to get you started.

Vulnerability Scanning Tool RFP Template

Looking for a vulnerability scanning tool? Use this Request for Proposal (RFP) template to get you started.

Implement Risk-Based Vulnerability Management – Executive Brief

Read our concise Executive Brief to find out why you should design and implement a vulnerability management program, review Info-Tech’s methodology, and understand the...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us