All Research

Build a Security Compliance Program – Phases 1-5

Read this blueprint to help build a cost-effective information security compliance management program.

Win More Grant Funding Opportunities

This research was created to support tribal nations' abilities to create and deliver vital services and programs to their members by securing grant funding. It presents a...
  • guided implementation icon

Respond to the SolarWinds Compromise

The extent and sophistication of this attack are staggering, and IT Security must be fully informed and take action immediately.

The New Anglo-Japanese Alliance

Scott Foster provides the connection between technology and economic trends covered by SNS and those in Asia. His deep understanding of, and experience with, tech sectors...

Restaurants Business-Aligned IT Strategy

Restaurants Business-Aligned IT Strategy

Restaurants Industry Impacts on IT Strategy: Senior Management Presentation Template

Restaurants Industry Impacts on IT Strategy: Senior Management Presentation Template

Restaurants IT Strategy Initiatives Workbook

Restaurants IT Strategy Initiatives Workbook

Restaurants Restaurmart Report

Restaurants Restaurmart Report

Restaurants Healthier, Local, Casual Report

Restaurants Healthier, Local, Casual Report

Restaurants IT Strategy Initiatives Workbook and Senior Management Presentation Template

Restaurants IT Strategy Initiatives Workbook and Senior Management Presentation Template
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us