Top IT Security Checklists

8669945865?profile=original

Index: (Browse By Domain) Top Checklists Handpicked by CISO Platform Editorial Team

8669806257?profile=original

Top Checklists On Application Security

1) Checklist to assess the effectiveness of your Vulnerability Management Program

2) 10 questions to ask before you start your Bug Bounty program…

3) Checklist to assess the effectiveness of your Vulnerability Management Program

4) How to choose your Security / Penetration Testing Vendor?

5) Technologies in Penetration Testing, What to choose ?

6) Checklist: How to choose between different types of Application Security Testing Technologies?

7) CISO Guide for Denial-of-Service (DoS) Security

8) Checklist to Evaluate A Cloud Based WAF Vendor


Go Back To The Index

8669806872?profile=original


Top Checklists On Data Security

1) Checklist to Evaluate a DLP Provider

2) Data Leakage Protection (DLP) via email gateway and Regulated Internet access

3) Checklist for PCI DSS Implementation & Certification

Go Back To The Index

8669805458?profile=original


Other Interesting Checklists

1) Technology/Solution Guide for Single Sign-On

2) Action List Before Adopting a Cloud Technology

3) Checklist to Evaluate IT Project Vendors


Go Back To The Index

8669802465?profile=original


Top Checklists On Incident Response

1) Incident Response: How To Respond To A Security Breach During First 24 Hours (Checklist)

2) Checklist: Skillset Required for an incident management person

3) Checklist To Evaluate SIEM Vendors

4) SIEM Tools: Implementation Guide and Vendor Evaluation Checklist

5) How effective is your SIEM Implementation?

Go Back To The Index

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform