Tagged - security operations

Threat Preparedness Using MITRE ATT&CK®

Info-Tech has developed an approach to prioritizing the threat areas that are most pressing to your enterprise. Using the MITRE ATT&CK framework, identify the impact of...
  • guided implementation icon

Threat Preparedness Using MITRE ATT&CK® – Executive Brief

Read our concise Executive Brief to find out why threat preparedness is a crucial first step in defending your network against any attack type. Review Info-Tech’s...

Threat Preparedness Using MITRE ATT&CK® – Phases 1-3

This storyboard will help you to adequately prepare against the tactics, techniques, and sub-techniques that a malicious attacker may use to gain access to and compromise...

Threat Preparedness Using MITRE ATT&CK® – Phase 1: Attack Tactics and Techniques

This phase of the blueprint Threat Preparedness Using MITRE ATT&CK® will help you understand all of the attack tactics and techniques that a malicious attacker may use to...

Threat Preparedness Using MITRE ATT&CK® – Phase 2: Threat Preparedness Workbook Mapping

This phase of the blueprint Threat Preparedness Using MITRE ATT&CK® will allow you to map your various security protocols against their impacts to understand how prepared...

Threat Preparedness Using MITRE ATT&CK® – Phase 3: Execute Remediation and Detective Measures

This part of the blueprint Threat Preparedness Using MITRE ATT&CK® will help you plan your next threat modeling session with actionable remediation efforts.

Build Your Security Operations Program From the Ground Up – Executive Brief

Security operations require a strategy because different processes need to collaborate and build upon each other to be effective. Read this Executive Brief to understand...

Identify Opportunities to Mature the Security Architecture

Organizations require an effective security architecture in order to connect security to the business. This blueprint demonstrates Info-Tech’s approach to evaluating the...
  • guided implementation icon

Identify Opportunities to Mature the Security Architecture – Executive Brief

Discover why every organization needs an appropriate security architecture. Review how this blueprint will assist with the development of a right-sized security...

Identify Opportunities to Mature the Security Architecture – Phases 1-2

Organizations require an effective security architecture in order to connect security to the business. This blueprint demonstrates Info-Tech's approach to evaluating the...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us