Tagged - security risk

Establishing Training Parameters Template

There are many factors that affect an organization's IT security training needs and goals: environment, specific security threats, and end-user perceptions and knowledge....

IT Security Training Tool

In order to create an effective IT security training program, you must make a series of key decisions based on information gathered during the Establishing Training...

Huawei, Part I

This week we offer the first part of a detailed look at what may be the most important company in the world - not solely because of its strategic positioning in core...

Huawei, Part 2

Last week, we offered the first part of a detailed look at what may be the most important company in the world - not solely because of its strategic positioning in core...

Don’t Be Shellshocked - Eliminate the Security Risks of Shellshock Quickly

Eliminate the security risks of Shellshock quickly. A brief research note for Info-Tech’s members.

Vendor Classification Model Tool

Use this tool to classify vendors.

Vendor Risk Management Program Manual

The Vendor Risk Management Program Manual will help you document your vendor risk management program to complement the IT risk management program.

Proactively Identify and Mitigate Vendor Risk – Phase 2: Assess Vendor Risk and Define Your Response Strategy

This phase of the blueprint, Proactively Identify and Mitigate Vendor Risk, will help you categorize, prioritize, and assess your vendor risks, followed by selecting...

Proactively Identify and Mitigate Vendor Risk – Phases 1-3

This storyboard will help your organization achieve vendor risk readiness by following Info-Tech's methodology.

Vendor Risk Profile and Assessment Tool

Use this tool to assess the risk exposure of your top 20 vendors.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us