91Ƭ

All 91Ƭ

91Ƭ, Optimize, and Present a Risk-Based Security Budget – Phase 3: Present the Budget

This phase of the blueprint, 91Ƭ, Optimize, and Present a Risk-Based Security Budget, will help you take your completed budget and communicate the value of security to...

Preshopping Security Budget Presentation Template

This template will help you build a presentation in order to perform “preshopping” with stakeholders. Preshopping is when you speak with stakeholders prior to the final...

Final Security Budget Presentation Template

This template will help you build a final budget presentation that you can deliver to stakeholders to gain final budgetary approval.

Indirect Access of SAP Systems May Cost You Millions

A recent UK court ruling in favor of SAP v. Diageo, a global drinks company, may broadly define the rules of indirect access of SAP software. Indirect access of SAP...

Vendor Scorecard

Assess vendors regularly with useful metrics to optimize your vendor portfolio.

Controlled Vendor Communications Letter

Establish a single point of contact and create a communication vacuum to help leverage your negotiation position.

Global Flows and Disruptions: From the Economy to the Environment

As we were realizing that we had discovered the two primary actions underlying literally everything else in the world, I had the chance to talk with Bill Janeway about...

Enablers and Vectors: Accelerating Innovation Deployment, Part II – Unicorns and Profitless Disruptions

In this week's discussion, I will take a look at the part of Valley startup culture that gets almost all of the outside attention, and a gigantic fraction of investor...

Embrace Information Lifecycle Management in Your ECM Program

Not all information assets are created equal; you need a structured approach to handling your organization’s information assets from creation to destruction that considers...
  • guided implementation icon

Information Domain Prioritization Tool

Use this tool to determine the scope of your ECM governance program by assessing the value and risk of your information domains.
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us