|
An Excel tool to evaluate your organization’s PKI maturity and readiness for post-quantum cryptography (PQC).
|
|
|
An Excel tool to help allocate ownership and responsibility for CLM and PKI processes.
|
|
|
This Excel tool gives you a comprehensive method to shortlist top vendor candidates.
|
|
|
An Excel-based workbook to identify your organization’s unique PaC context.
|
|
|
An Excel-based scenario-mapping tool to score the likelihood and impact of deepfake risks in your organization.
|
|
|
An Excel-based tool to develop your improvement plan across an intelligent Secure Software Development Lifecycle (iSSDLC).
|
|
|
A detailed Excel workbook designed to help you understand where you stand with your security capabilities.
|
|
|
Use this Excel-based tool to develop a product/service risk assessment and assign a risk rating.
|
|
|
Use this collection of workbooks to create a vendor security assessment for low, medium, and high-risk vendors.
|
|
|
This Excel database maintains an inventory of all known vendors and the results of their last known security assessments.
|
|