There are many factors that affect an organization's IT security training needs and goals: environment, specific security threats, and end-user perceptions and knowledge....
|
|
In order to create an effective IT security training program, you must make a series of key decisions based on information gathered during the Establishing Training...
|
|
This week we offer the first part of a detailed look at what may be the most important company in the world - not solely because of its strategic positioning in core...
|
|
Last week, we offered the first part of a detailed look at what may be the most important company in the world - not solely because of its strategic positioning in core...
|
|
Eliminate the security risks of Shellshock quickly. A brief research note for Info-Tech’s members.
|
|
Use this tool to classify vendors.
|
|
The Vendor Risk Management Program Manual will help you document your vendor risk management program to complement the IT risk management program.
|
|
This phase of the blueprint, Proactively Identify and Mitigate Vendor Risk, will help you categorize, prioritize, and assess your vendor risks, followed by selecting...
|
|
This storyboard will help your organization achieve vendor risk readiness by following Info-Tech's methodology.
|
|
Use this tool to assess the risk exposure of your top 20 vendors.
|
|