Papers

Employee Security Training Planner

Employee Security Training Planner

This planner will help your organization to develop an effective security awareness and training program.

Download Planner


Information Security Risk Assessments

Best Practices for Information Security Risk Assessments

This paper provides everything you need to know about this essential review from planning to execution to follow-up.

Get the Guide Now


Digital Forensics Use Cases

Digital Forensics Use Cases

Use this guide to understand how a digital forensics investigator can support your work in a variety of legal scenarios.

Get Use Cases Now


An IT Manager's Guide to a Successful Audit

An IT Manager's Guide to a Successful Audit

This paper provides an overview of the audit process and how IT management can insert themselves into this process to benefit from the exercise.

Get the Guide Now


An IT Director's Guide to Communicating Security Needs with the Executive Team

An IT Director's Guide to Communicating Security Needs with the Executive Team

This paper discusses effective ways to communicate security concerns and solutions to the executive team – providing talking points and suggestions.

Get the Guide Now


Enhancing Information Security in an Unsecure World

Enhancing Information Security in an Unsecure World

This paper reviews four areas of concern: Passwords, Network Considerations, Data Security and Social Engineering. Each section (except social engineering) is made up of three levels: Basic, Moderate and Advanced. Each level progressively guides how to improve security practices.

Download Document


Paper: First Steps in Compliance Initiatives - Risk Assessments and Policies

First Steps in Compliance Initiatives | Risk Assessments and Policies

Compliance is not a technology problem, it is a business problem. So many times we look to technology to solve all of our problems, but the real solution comes from our policies, procedures and documentation. Download this Paper to get 6 Helpful Tips for Improving Your Policy Writing Process.

Download Document


Paper: A comparison between MSSP and On-premise SIEM

Understanding SIEM Options | Time. Money. Resources. - A comparison between MSSP and On-premise SIEM

Deciding between a managed security services provider (MSSP) and on-premise SIEM solution can be daunting, but gaining a basic understanding of the differences will help your organization establish its best approach to security monitoring.

Download SIEM Document

The information we track while users are on our websites helps us analyze site traffic, optimize site performance, improve our services, and identify new products and services of interest to our users. To learn more please see our Privacy Policy.