91Ƭ

91Ƭ an Information Security Strategy – Phases 1-4

Use this storyboard to build or update a business-aligned, risk-aware, and holistic information security strategy that prioritizes program initiatives for the next three...

Threat Landscape Briefing – March 2024

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, hacktivists campaigns, data breaches, control strategies, and exposure to...

Protect Your Organization's Online Reputation

Understanding what your online reputation is can go a long way to understanding and improving your business. Don’t be caught by surprise. Gain control of your...

Conduct an AI Privacy Risk Assessment – Phases 1-3

Learn how to carefully balance the implications of data privacy adherence with adoption of AI technologies to drive efficiencies in the context of your business.

Conduct an AI Privacy Risk Assessment

Design an AI implementation that is guided by data governance and data privacy best practices. Effective AI implementation is built on a foundation of effective data...
  • guided implementation icon

AI Privacy Impact Assessment Tool

Leverage PIAs to empower your AI technology by integrating protection and management of personal data at scale.

Sample AI PIA for Microsoft Copilot

Introduce Gen AI across Microsoft business applications.

Spoofing Be Gone: Abnormal Security Says Hasta la Vista, Baby, to Business and Vendor Email Compromise Scams

The conversation around security awareness training and phishing simulations has changed in the past year. The training and tools of the past simply aren’t working against...

AppViewX: Beyond PKI Automation – A Comprehensive Machine Identity Management Solution

In today's cybersecurity landscape, managing machine identities and digital certificates across complex, hybrid multi-cloud environments is a growing challenge. As the...

Zscaler: Redefining Security in the Zero Trust Era

This analysis examines Zscaler's cloud-based security platform, with a focus on its Zero Trust Exchange (ZTE), Zero Trust Network Access (ZTNA), and broader suite of...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us