Use this collection of workbooks to create a vendor security assessment for low, medium, and high-risk vendors.
|
|
This storyboard will help you define and plan your journey to implementing a right-sized vendor security assessment process.
|
|
Use this easily-customizable template to establish security requirements for engaging with vendors.
|
|
This Privacy Regulation Roundup summarizes the latest major global privacy regulatory developments, announcements, and changes. This report is updated on a monthly basis.
|
|
As more organizations move to a cloud-first or hybrid deployment model, the protection of cloud-native applications is of the utmost importance. This tech note explores how...
|
|
This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control strategies and exposure...
|
|
This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, hacktivists campaigns, data breaches, control strategies, and exposure to...
|
|
A template to document your objectives, scope, and other relevant information for your tabletop program.
|
|
A tool designed to help you assess your requirements for tabletop planning.
|
|
Organizations have operational resilience plans, but these often fall short when tested during real crises. 91Ƭ long-term resilience by regularly practicing and updating...
|
|