Security - Notes and Videos

Build Your AI Risk Management Roadmap Deck

AI solutions introduce transformative potential, as well as financial and reputational risks that must be mitigated. Take a proactive stance against AI threats by...

Stop Wasting Time Evaluating Commoditized Products 2025

Traditional procurement practices don’t work in an exponential world. Rethink the way you make purchasing decisions and evaluate solutions with a vendor management practice...

Succeed With Enterprise Application Selection Deck

​Too often, organizations leap to an enterprise application choice without spending time on what truly matters. Set yourself up for success by first focusing on a strategic...

Maximize Your Investment in Microsoft Security Tools Deck

​Microsoft’s recent massive investments have made them a security tool powerhouse. You may have access to some of their tools by now, but are you truly maximizing their...

Info-Tech’s Guide to IT Diagnostics

​The first step to solving any problem is understanding what’s causing it. Explore Info-Tech’s suite of comprehensive diagnostics to help you identify your strengths and...

A Roadmap to Post-Quantum Cryptography

The impending shift to post-quantum cryptography will redefine digital privacy, secure communications, and cybersecurity infrastructure. Discover and implement more...

Build Your All-Star Security Team

Learn how to build an effective cybersecurity team through the assessment and development of security competencies that are attainable, business-aligned, and enable...

Synchronizing the Pillars of the Security Strategy

Maturity, culture, and organizational goals are the three core pillars of any strong security strategy. Explore how each of the pillars individually contribute to a...

Driving Innovation Through Security Assessments 

Security assessments are crucial for strengthening security posture. Learn about the main changes to Info-Tech’s security diagnostics, their alignment to Info-Tech’s...

Threat Landscape Briefing – May 2025

This monthly recording covers topics such as cyberthreat trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control strategies, and exposure...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us