Enterprise Threat Preparedness Workbook

Use the Enterprise Threat Preparedness Workbook to document your preparedness for each of the various attack tactics and techniques that an attacker may use. Choose the...

Threat Preparedness Using MITRE ATT&CK® – Phase 3: Execute Remediation and Detective Measures

This part of the blueprint Threat Preparedness Using MITRE ATT&CK® will help you plan your next threat modeling session with actionable remediation efforts.

Identify the Components of Your Cloud Security Architecture – Phase 2: Business-Critical Workload Analysis

This phase of the blueprint Identify the Components of Your Cloud Security Architecture will help you to understand both the risks and controls for your businesses critical...

Cloud Security Architecture Workbook

Use the Cloud Security Architecture Workbook to understand the risks, effort and mitigating services that you can use when moving your workloads to the cloud. The process...

Cloud Security Architecture Archive Document

This template, part of the Identify the Components of Your Cloud Security Architecture blueprint, will serve as a repository of information about your approach to securing...

Cloud Security Architecture Reference Model

Plot your findings from the Workbook and Archive Document to see the current state of your cloud security architecture, the risks, and where you still need to go.

Cloud Security Architecture Communication Deck

Socialize your findings to executive stakeholders and decision makers with a customizable, prepopulated communication deck. Explain the risks and the security services that...

Identify the Components of Your Cloud Security Architecture – Phase 4: Cloud Security Strategy Planning

This part of the blueprint Identify the Components of Your Cloud Security Architecture explores additional considerations when moving to the cloud – in particular, the...

Identify the Components of Your Cloud Security Architecture – Phases 1-4

This storyboard will help you to identify the security components required for a robust cloud security architecture.

Identify the Components of Your Cloud Security Architecture

Info-Tech has developed an approach to cloud security that is built on the strong foundations of our security strategy model that has been successfully implemented across...
  • guided implementation icon
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us