Fast Track Your GDPR Compliance Efforts – Phase 5: Prioritize Your GDPR Initiatives

This phase of the blueprint, Fast Track Your GDPR Compliance Efforts, highlights the next regulatory steps and helps prioritize all your compliance projects.

Manage Third-Party Service Security Outsourcing – Phase 3: Manage Your Third-Party Provider

This phase of the blueprint, Manage Third-Party Service Security Outsourcing, will help you understand how to align third-party providers to your organization.

Build an IT Risk Management Program – Phases 1-3

Managing risk has never been more important. Ensure that your organization has an established and manageable way of governing a process related to identifying, assessing,...

Security Governance and Management Communication Plan

This template will help you organize your various security communication efforts with different stakeholders.

The Rise of Human-Centric Data Loss Prevention: A Deep Dive Into Proofpoint’s Approach

With evolving threats and regulations, traditional DLP solutions are struggling to keep pace. Proofpoint is addressing these challenges with its Information Protection...

Security Operations MSSP RFP Template

An RFP is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of requirements.

Manage Third-Party Service Security Outsourcing – Phase 1: What to Outsource

This phase of the blueprint, Manage Third-Party Service Security Outsourcing,will help you identify different responsibilities and functions in your organization and...

Build a Data Privacy Program – Executive Brief

Read this Executive Brief to understand why Info-Tech's approach to Data Privacy is unique and how applying a quantitative lens to an often qualitative subject will help...

Fast Track Your GDPR Compliance Efforts – Phase 3: Satisfy Documentation Requirements

This phase of the blueprint, Fast Track Your GDPR Compliance Efforts, will help you satisfy a core regulatory requirement: a record of processing.

Information Security Awareness and Training Content Development Tool

This tool will help to identify content that should be covered by your security awareness and training program.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us