Use this easily-customizable template to establish security requirements for engaging with vendors.
|
|
This Excel database maintains an inventory of all known vendors and the results of their last known security assessments.
|
|
Use this collection of workbooks to create a vendor security assessment for low, medium, and high-risk vendors.
|
|
Use this Excel-based tool to develop a product/service risk assessment and assign a risk rating.
|
|
A tool designed to help you assess your requirements for tabletop planning.
|
|
A tool designed to help you leverage generative AI to produce realistic and relevant scenarios for a tabletop exercise.
|
|
Use this tool to compare the controls you have in place to counter the ransomware kill chain.
|
|
Use this guide in conjunction with the project blueprint 91Ƭ Resilience Against Ransomware Attacks and the associated tabletop planning session templates. We recommend...
|
|
Adapt this tabletop planning session template to plan and practice the response of your internal IT team to a ransomware scenario.
|
|
Use this assessment tool to assess existing protection, detection, response, and recovery capabilities and identify potential improvements.
|
|