91ÖÆÆ¬³§

Tagged - vulnerabilities

Vulnerability Management SOP Template

As you are defining or improving your process, be sure to document it. This template provides a starting point in maintaining a detailed standard operating procedure.

Implement Risk-Based Vulnerability Management

Vulnerabilities will always exist. Addressing these will consume your department’s time and resources, and your efforts will quickly become stale as new vulnerabilities are...
  • guided implementation icon

Threat Landscape Briefing – March 2021

This monthly recording covers topics such as cyber threat and regulatory trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control...

Threat Landscape Briefing – February 2021

This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals and hacktivists campaigns, data breaches, control strategies,...

Threat Landscape Briefing – October 2020

This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals and hacktivists campaigns, data breaches, control strategies,...

Design a Coordinated Vulnerability Disclosure Program – Phases 1-2

This storyboard will help you develop a methodology for receiving vulnerability reports from external parties.

Design a Coordinated Vulnerability Disclosure Program – Executive Brief

Read this Executive Brief to understand why a coordinated vulnerability disclosure program is needed in today's modern security landscape.

Security Governance Organizational Structure

A formalized security organizational structure assigns and defines the security roles and responsibilities of different members in the organization. Clarity of...

Business Requirement Security Strategy Mapping Tool

Use this tool to map business and IT initiatives to specific security mitigation controls. This tool is a documentation and mapping support tool as part of your larger...

Information Security Communication Plan Template

Communication between security and the rest of the business can be difficult because the two parties often speak different languages. Your security messages should be...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us