Employee Security Training Planner
This planner will help your organization to develop an effective security awareness and training program.
Best Practices for Information Security Risk Assessments
This paper provides everything you need to know about this essential review from planning to execution to follow-up.
Digital Forensics Use Cases
Use this guide to understand how a digital forensics investigator can support your work in a variety of legal scenarios.
An IT Manager's Guide to a Successful Audit
This paper provides an overview of the audit process and how IT management can insert themselves into this process to benefit from the exercise.
An IT Director's Guide to Communicating Security Needs with the Executive Team
This paper discusses effective ways to communicate security concerns and solutions to the executive team – providing talking points and suggestions.
Enhancing Information Security in an Unsecure World
This paper reviews four areas of concern: Passwords, Network Considerations, Data Security and Social Engineering. Each section (except social engineering) is made up of three levels: Basic, Moderate and Advanced. Each level progressively guides how to improve security practices.
First Steps in Compliance Initiatives | Risk Assessments and Policies
Compliance is not a technology problem, it is a business problem. So many times we look to technology to solve all of our problems, but the real solution comes from our policies, procedures and documentation. Download this Paper to get 6 Helpful Tips for Improving Your Policy Writing Process.
Understanding SIEM Options | Time. Money. Resources. - A comparison between MSSP and On-premise SIEM
Deciding between a managed security services provider (MSSP) and on-premise SIEM solution can be daunting, but gaining a basic understanding of the differences will help your organization establish its best approach to security monitoring.