91Ƭ

Threat Preparedness Using MITRE ATT&CK® – Phase 1: Attack Tactics and Techniques

This phase of the blueprint Threat Preparedness Using MITRE ATT&CK® will help you understand all of the attack tactics and techniques that a malicious attacker may use to...

Threat Preparedness Using MITRE ATT&CK® – Phases 1-3

This storyboard will help you to adequately prepare against the tactics, techniques, and sub-techniques that a malicious attacker may use to gain access to and compromise...

Threat Preparedness Using MITRE ATT&CK® – Executive Brief

Read our concise Executive Brief to find out why threat preparedness is a crucial first step in defending your network against any attack type. Review Info-Tech’s...

Threat Preparedness Using MITRE ATT&CK®

Info-Tech has developed an approach to prioritizing the threat areas that are most pressing to your enterprise. Using the MITRE ATT&CK framework, identify the impact of and...
  • guided implementation icon

Cloud Security Architecture Communication Deck

Socialize your findings to executive stakeholders and decision makers with a customizable, prepopulated communication deck. Explain the risks and the security services that...

Cloud Security Architecture Workbook

Use the Cloud Security Architecture Workbook to understand the risks, effort and mitigating services that you can use when moving your workloads to the cloud. The process...

Cloud Security Architecture Archive Document

This template, part of the Identify the Components of Your Cloud Security Architecture blueprint, will serve as a repository of information about your approach to securing...

Cloud Security Architecture Reference Model

Plot your findings from the Workbook and Archive Document to see the current state of your cloud security architecture, the risks, and where you still need to go.

Identify the Components of Your Cloud Security Architecture – Phase 4: Cloud Security Strategy Planning

This part of the blueprint Identify the Components of Your Cloud Security Architecture explores additional considerations when moving to the cloud – in particular, the...

Identify the Components of Your Cloud Security Architecture

Info-Tech has developed an approach to cloud security that is built on the strong foundations of our security strategy model that has been successfully implemented across...
  • guided implementation icon
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us