Workiva and CFGI to Collaborate in the SOX and GRC Space

“Connected reporting capabilities, control testing, real-time collaboration, cloud-based access, stringent security measure and permissions controls” are considered the...

New York State Leads the Charge in Upcoming Zoom Security Enhancements

The Office of the Attorney General of the State of New York has reached a settlement with Zoom Video Communications. The agreement promises enhanced data security and...

Kenna Security Offers Vulnerability Management Options: Kenna.VM & Kenna.VI

Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created...

Webinar: Responsibly Resume IT Operations in the Office

IT must quickly identify the must-dos to allow a safe return to the office. During this webinar we will go through how to build a prioritized roadmap for safe reopening...

PHEMI: A Data Privacy Tool for Healthcare Providers

PHEMI is a data privacy solution focused on keeping data-processing activities secure by redacting information based on the role of the accessor. Thus, allowing such data...

Air Canada's Temperature Testing Raises Concern for Individual Data Privacy, Explained by a Privacy Expert

In an interview with Info-Tech analysts, privacy expert Dr. Ann Cavoukian explains why Air Canada's recent mandatory temperature check policy to screen for COVID-19...

Acronis Cyber Protect Cloud Turns Managed Service Providers Into Managed Security Providers

More than ever, cybersecurity solutions are core to any MSPs offering. No longer should technology service providers be farming this out to dedicated security providers....

Information Security Steering Committee RACI Chart

Use this RACI chart to keep track of responsibility and accountability for tasks related to your Information Security Steering Committee.

Policy Exception Tracker

Use this tool to help you track ongoing exceptions to your security policies.

Information Security Policy Exception Request Form

Use this template as a means to request and approve proposed exceptions to your security policies.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us