91Ƭ

Security Incident Runbook Prioritization Tool

Prioritize the order in which the security incident runbooks will be developed based on the frequency and the impact of the potential incidents.

Security Incident Management Plan

Formalize the security incident management program by defining a central, high-level guide to describe goals, roles, and responsibilities, as well as the process that will...

Security Incident Management RACI Tool

Assign responsibilities and deadlines for incident response and the management process.

Data Breach Reporting Requirements Summary

Use this template to help keep track of your regulatory reporting requirements following a data breach.

Root-Cause Analysis Template

Use this template to help you determine the root-cause of your security incident.

Security Incident Report Template

Use this template to create a high-level summary of security incidents.

Security Incident Management Maturity Checklist ‒ Preliminary

Use this tool to help you quickly gauge your organization's current security incident management processes.

Puppet Rolls Out Remediate

Puppet has rolled out Remediate. This release aligns with the ongoing consolidation between IT Operations and IT Security.

Ayehu Bridges Gap Between IT Ops and Sec Ops

Ayehu is working to bridge the gap between IT Operations and Security Operations. We expect to see more vendor product offerings follow suit.

LogPoint Continues to Expand Into Global Markets

LogPoint, the next generation SIEM, UEBA, and big data analytics company, continues to expand into the global market outside of its European base.
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us