All Research

Improve Security Governance With a Security Steering Committee – Phase 3: Operate the Information Security Steering Committee

This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you define your meeting agendas and the procedures to support those...

Information Security Steering Committee Stakeholder Presentation

Use this template to explain the goals and benefits of the Information Security Steering Committee.

IT Service Management Automation in Healthcare

Advances in cloud and AI technology are now opening up the possibilities for organizations to leverage automation for IT service management. A survey conducted by...

Red Hat Customers Should Be Reeling From IBM’s Buyout

The announcement that IBM is taking over Red Hat may be welcome news to beleaguered and beaten down IBM shareholders, but it should strike a stark warning bell for Red...

Are You Ready for AI?

As organizations are turning to AI, the question typically arises: Where and how do we start? A good way to begin is to think about the potential benefits of the new...

Build a Vendor Security Assessment Service

Risks from third parties are on the rise, but many organizations still struggle with how to tackle this problem. A risk-based approach is needed to manage supply chain...
  • guided implementation icon

Build a Vendor Security Assessment Service – Executive Brief

Read this Executive Brief to understand why vendor security risk management is becoming an increasing concern for companies and regulators, and what you can do about it.

Build a Vendor Security Assessment Service – Phases 1-3

This storyboard will help you build or improve your vendor security assessment service using a risk-based approach to maximize efficiency.

Build a Vendor Security Assessment Service – Phase 1: Define Governance and Process

This phase of the blueprint, Build a Vendor Security Assessment Service, will help you determine your business requirements and build your process to meet them.

Build a Vendor Security Assessment Service – Phase 2: Develop Assessment Methodology

This phase of the blueprint, Build a Vendor Security Assessment Service, will help you develop procedures and tools to assess vendor risk.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us