91ÖÆÆ¬³§

Tagged - vulnerabilities

Threat Landscape Briefing – March 2021

This monthly recording covers topics such as cyber threat and regulatory trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control...

Threat Landscape Briefing – February 2021

This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals and hacktivists campaigns, data breaches, control strategies,...

Threat Landscape Briefing – October 2020

This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals and hacktivists campaigns, data breaches, control strategies,...

Design a Coordinated Vulnerability Disclosure Program – Phases 1-2

This storyboard will help you develop a methodology for receiving vulnerability reports from external parties.

Design a Coordinated Vulnerability Disclosure Program – Executive Brief

Read this Executive Brief to understand why a coordinated vulnerability disclosure program is needed in today's modern security landscape.

Security Governance Organizational Structure

A formalized security organizational structure assigns and defines the security roles and responsibilities of different members in the organization. Clarity of...

Business Requirement Security Strategy Mapping Tool

Use this tool to map business and IT initiatives to specific security mitigation controls. This tool is a documentation and mapping support tool as part of your larger...

Information Security Communication Plan Template

Communication between security and the rest of the business can be difficult because the two parties often speak different languages. Your security messages should be...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us