All Research

From Silos to Synergy: Create Marketing and IT Alignment

CTOs and CMOs can use this research to break down IT and marketing silos and ensure the departments are working toward common goals. Strategically aligned IT and marketing...
  • guided implementation icon

Perimeterless Network Vendor Evaluation Tool

This tool helps identify successful vendor candidates for shortlisting based on a unique, user-defined set of characteristics.

Secure Your Perimeterless Network Storyboard

Determine which methods and tools are required to support your security pillars in a perimeterless environment.

Secure Your Perimeterless Network

Due to the increased attack surface of perimeterless networks, whether it is location, devices, or distributed resources in a cloud environment, considerations for security...

PitchBob Case Study: AI for Productivity and Pitch Decks

How AI is used in productivity and pitch decks.

TRA Process Map

Use this template to document your threat and risk assessment process.

Security Risk Tolerance Assessment Tool

Use this tool to determine your organizational tolerance for security risk.

Security Risk Management RACI Tool

Use this tool to document the roles and responsibilities of your security risk management activities.

Security Risk Management Maturity Assessment Tool

Use this tool to assess the current and target maturity of your security risk management program.

Assess and Manage Security Risks – Phases 1-4

Use this blueprint to lay down the foundations for security risk management, including governance, assessment, and risk treatment.
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us