91ÖÆÆ¬³§

Tagged - compliance

Looking at Risk in a New Light: What to Do About Tariffs

Organizations should pay attention to the forces that vendors are subject to (tariffs, demand, supply chain disruptions, etc.). In today’s world those factors put pressure...

Identity and Access Management Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Manufacturing Cybersecurity Risk Assessment Tool

This tool is designed to help manufacturing organizations assess their current cybersecurity risks, identify potential vulnerabilities, and receive targeted recommendations...

Understand Modern Cybersecurity Solutions for Manufacturing IT & OT Storyboard

The research and strategies discussed in this blueprint aim to equip CIOs with the necessary knowledge and tools to navigate the challenges of upgrading their manufacturing...

Understand Modern Cybersecurity Solutions for Manufacturing IT & OT

Smart factories represent a paradigm shift in manufacturing, integrating advanced digital technologies to enhance operational efficiency and production capabilities....

4CRisk Case Study: AI for Compliance Management

How AI is used in compliance management.

91ÖÆÆ¬³§ an Information Security Strategy for Small Enterprises

91ÖÆÆ¬³§ a business-aligned, risk-aware, holistic security strategy that is suited for your small enterprise: gather business requirements to prioritize improvements; assess...
  • guided implementation icon

Vendor Management Governance: Forming the Vendor Management Initiative

As with all business practices, organizations should define how the vendor practice should operate in their respective culture. Organizations setting expectations for...

The Duty of Due Diligence: Examining your vendors could prevent disaster

Due diligence grants us a glimpse into the potential risks of entering vendor relationships. More importantly, performing due diligence allows us to continually reassess...

Privacy Framework Tool

The key deliverable in the Data Privacy Program blueprint, the Data Privacy Framework takes into account the current state of privacy and provides you with the steps to...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us