|
Use this tool to identify which risk categories are of primary concern to your organization based on your internal and external environment, as well as set of predefined...
|
|
|
Quantify the business impact of a ransomware attack to communicate risk and prioritize the systems and data that need the greatest protection
|
|
|
Use the Cloud Security Architecture Workbook to understand the risks, effort and mitigating services that you can use when moving your workloads to the cloud. The process...
|
|
|
Determine the risk of your vulnerabilities using an impact and likelihood measure based on the specifics of your organization and its applications and services.
|
|
|
The Privacy and Security Business Alignment Tool is your repository for tracking the alignment of your business objectives, privacy and security enablers, and associated...
|
|
|
Use the Enterprise Threat Preparedness Workbook to document your preparedness for each of the various attack tactics and techniques that an attacker may use. Choose the...
|
|
|
Use this tool to determine your privacy program's maturity and to identify any initiatives needed to close gaps and boost maturity in assessed areas.
|
|
|
This tool will help you determine your privacy program goals and develop KPIs to measure your progress on those goals.
|
|
|
A best-of-breed template to help you document roles and responsibilities related to identity security.
|
|
|
A structured tool to help you inventory identity types, threats, and mitigations using the MITRE ATT&CK® framework.
|
|