Tagged - security strategy

Security Strategy: Mature Your Security Practice With Strategy

Security strategy is about the choices we make to prioritize what we do to better protect our data. A comprehensive and flexible security strategy that mitigates risk is...

Guidelines for Compliance With Local Security and Privacy Laws Template

Use this template to develop guidelines for compliance with local security and privacy laws.

Digital Safety Guidelines for International Travel

Use this template to develop digital safety guidelines for international travel.

Jurisdictional Risk Register and Heat Map Tool

Use this Excel tool as the repository for security and privacy risks in high-risk jurisdictions. Describe the risk profile of key risk scenarios, analyze your risk...

Secure Operations in High-Risk Jurisdictions – Phases 1-3

Use this storyboard to build a process that will identify, assess, and address information security and privacy risks in high-risk jurisdictions.

Secure Operations in High-Risk Jurisdictions

Security leaders who support operations in high-risk jurisdictions contend with unique risk scenarios, including local compliance risk, high-risk travel, and telework...
  • guided implementation icon

Discover and Classify Your Data – Executive Brief

Read this Executive Brief to understand why data classification is an initiative for the entire organization and how this blueprint can help simplify the process.

Threat Preparedness Using MITRE ATT&CK® – Executive Brief

Read our concise Executive Brief to find out why threat preparedness is a crucial first step in defending your network against any attack type. Review Info-Tech’s...

Threat Preparedness Using MITRE ATT&CK®

Info-Tech has developed an approach to prioritizing the threat areas that are most pressing to your enterprise. Using the MITRE ATT&CK framework, identify the impact of...
  • guided implementation icon

Threat Preparedness Using MITRE ATT&CK® – Phase 1: Attack Tactics and Techniques

This phase of the blueprint Threat Preparedness Using MITRE ATT&CK® will help you understand all of the attack tactics and techniques that a malicious attacker may use to...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us