Use this tool to identify and assess security threats and risks against a system or application.
|
|
Use this template to document the overall process and structure of your security risk assessment program.
|
|
A mature security risk management practice is a critical component of a comprehensive and risk-aware information security program. Use this blueprint to effectively...
|
|
As cyberthreats continue to evolve, managing access to sensitive resources is a growing challenge for organizations. Lumos, a relatively new player in the identity...
|
|
The IT Management & Governance (M&G) framework was designed with COBIT 2019 as its core and enhanced with the agility of Info-Tech’s knowledge and expertise. The...
|
|
A recently published resource from Info-Tech Research Group offers a comprehensive roadmap for organizations to advance toward autonomous security defenses. The firm’s...
|
|
Getting into an agreement is easy; getting out can be hard or impossible. With a little planning, though, you can minimize the risk of being stuck in a bad contract.
|
|
The use case library covers internal (operational) and external (customer-facing) AI use in credit unions and small banks.
|
|
The retail banking industry is struggling with its core banking systems, especially the digital front ends that drive customers’ online and mobile banking experiences....
|
|
Global research and advisory firm Info-Tech Research Group has released research insights on identity authentication practices. The firm offers a comprehensive roadmap...
|
|