Security - Notes and Videos

Webinar: Reduce Risks With a Quantitative Approach to Privacy Compliance

The privacy compliance landscape is constantly shifting. Learn how to take a quantitative, operational approach to reducing your organization's privacy risk.

Design a Coordinated Vulnerability Disclosure Program – Executive Brief

Read this Executive Brief to understand why a coordinated vulnerability disclosure program is needed in today's modern security landscape.

Webinar: Create a Business-Aligned Information Security Strategy

Organizations need security programs that are holistic, risk-aware, and business-aligned. Watch this webinar to learn how to create a successful security strategy.

Build a Data Privacy Program – Executive Brief

Read this Executive Brief to understand why Info-Tech's approach to Data Privacy is unique and how applying a quantitative lens to an often qualitative subject will help...

Air Canada's Temperature Testing Raises Concern for Individual Data Privacy, Explained by a Privacy Expert

In an interview with Info-Tech analysts, privacy expert Dr. Ann Cavoukian explains why Air Canada's recent mandatory temperature check policy to screen for COVID-19 should...

Webinar: Responsibly Resume IT Operations in the Office

IT must quickly identify the must-dos to allow a safe return to the office. During this webinar we will go through how to build a prioritized roadmap for safe reopening of...

Re-Evaluating Privacy and Technology During a Pandemic

When challenging and unprecedented situations occur, the initial reaction is born out of survival instincts. These short-term solutions often negate a calculated set of...

Webinar: Cybersecurity Priorities in Times of Pandemic

The new remote workforce opens your attack surface. Adjust your security strategy with the current priorities and tackle initiatives that can reduce the suddenly larger...

Cybersecurity Maturity Model Certification (CMMC) – Should DoD Contractors Prepare Amidst COVID-19?

A note offering guidance to organizations that have, or endeavor to have, a contract relationship with the United States Department of Defense (U.S. DoD) amid the new...

Monitor Remote User Activity via SIEM

The COVID-19 pandemic is an opportunity for cybercriminals as organizations reduce focus on security protocols due to time-sensitive remote access initiatives. SIEM can...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us