91Ƭ

Security Risk, Strategy & Governance

Resume Operations Information Security Pressure Analysis Tool

Use this tool in phase 1 of the Responsibly Resume IT Operations in the Office research to evaluate and better understand the organization's post-pandemic risk tolerance.

Responsibly Resume IT Operations in the Office – Phase 2: Repatriate People to the Office

Prepare to return your employees to the office. Ensure that IT takes into account the health and safety of employees while creating an efficient and sustainable working...

Mid-Pandemic IT Prioritization Tool

The Mid-Pandemic IT Prioritization Tool simplifies the long to-do list of transition tasks for your IT and InfoSec team to carry out. Identify, classify, and prioritize...

Responsibly Resume IT Operations in the Office – Phase 3: Repatriate Assets to the Office

Prepare the organization's assets for return to the office. Ensure that IT takes into account the off-license purchases and new additions to the hardware family that took...

Responsibly Resume IT Operations in the Office – Phase 4: Repatriate Workloads to the Office

Prepare and position IT to support workloads in order to streamline office reintegration. This may include leveraging pre-existing solutions in different ways and providing...

Responsibly Resume IT Operations in the Office – Phase 5: Prioritize Your Tasks and 91Ƭ the Roadmap

Once you've identified IT's supporting tasks, it's time to prioritize. This phase walks through the activity of prioritizing based on cost/effort, alignment to business,...

Restart the Engine of Your Project Portfolio

Restarting the engine of the project portfolio mid-pandemic won’t be as simple as turning a key and hitting the gas. Use this concise research to find the right path...

IBM Zero-Day Vulnerabilities Leave Enterprises Open to Remote Execution Attacks

Four zero-day vulnerabilities were discovered in IBM’s Data Risk Manager. While the vulnerabilities are concerning, more so is IBM’s response when addressed. The company...

Will New IoT Security Frameworks Push Compliance Obligations to the Forefront of Security Discussions?

The Internet of Things is increasingly embedded with our daily lives. While these devices make life more accessible, for every new device, a new attack vector for...

Re-Evaluating Privacy and Technology During a Pandemic

When challenging and unprecedented situations occur, the initial reaction is born out of survival instincts. These short-term solutions often negate a calculated set of...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us