91ÖÆÆ¬³§

Tagged - patching

Vulnerability Management SOP Template

As you are defining or improving your process, be sure to document it. This template provides a starting point in maintaining a detailed standard operating procedure.

Vulnerability Management Workflow

The workflows in the Standard Operating Procedure are provided in this raw working file for you to edit as needed.

Vulnerability Management Risk Assessment Tool

Determine the risk of your vulnerabilities using an impact and likelihood measure based on the specifics of your organization and its applications and services.

Implement Risk-Based Vulnerability Management

Vulnerabilities will always exist. Addressing these will consume your department’s time and resources, and your efforts will quickly become stale as new vulnerabilities are...
  • guided implementation icon

Penetration Test RFP Template

Looking to engage a vendor for a Penetration Test? Use this Request for Proposal (RFP) template to get you started.

Vulnerability Scanning Tool RFP Template

Looking for a vulnerability scanning tool? Use this Request for Proposal (RFP) template to get you started.

Responsibly Resume IT Operations in the Office – Phase 5: Prioritize Your Tasks and 91ÖÆÆ¬³§ the Roadmap

Once you've identified IT's supporting tasks, it's time to prioritize. This phase walks through the activity of prioritizing based on cost/effort, alignment to business,...

Responsibly Resume IT Operations in the Office – Phase 4: Repatriate Workloads to the Office

Prepare and position IT to support workloads in order to streamline office reintegration. This may include leveraging pre-existing solutions in different ways and providing...

Responsibly Resume IT Operations in the Office – Phase 3: Repatriate Assets to the Office

Prepare the organization's assets for return to the office. Ensure that IT takes into account the off-license purchases and new additions to the hardware family that took...

Mid-Pandemic IT Prioritization Tool

The Mid-Pandemic IT Prioritization Tool simplifies the long to-do list of transition tasks for your IT and InfoSec team to carry out. Identify, classify, and prioritize...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us