Vendor Security Assessment Inventory

This Excel database maintains an inventory of all known vendors and the results of their last known security assessments.

Vendor Security Questionnaire

Use this collection of workbooks to create a vendor security assessment for low, medium, and high-risk vendors.

Build Adaptive Security Services

Shift from reactive defense mechanisms to proactive, strategic, and business-aligned security services that will demonstrate the value and ROI of security services to your...

Get Started With AI Red-Teaming

The double-edged AI revolution has brought tangible benefits for IT but also opportunities for threat actors to deploy more sophisticated and varied cyberattacks.

Uptycs: Your Swiss Army Knife for CNAPP Solutions

As more organizations move to a cloud-first or hybrid deployment model, the protection of cloud-native applications is of the utmost importance. This tech note explores how...

Get Started With AI Red-Teaming Storyboard

Use this deck to plan your approach to AI red-teaming, execute your AI red-teaming exercise in a way that makes sense for your organization, and build the right guardrails...

Threat Landscape Briefing – April 2025

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control strategies and exposure...

Security Compliance Management Tool

Use this tool to track your security compliance management framework and program.

Threat Landscape Briefing – March 2025

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, hacktivists campaigns, data breaches, control strategies, and exposure to...

Data Center Disruption – Simple BCDR Scenario

An example tabletop scenario that can be used for a tabletop exercise.
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us