Vendor Security Questionnaire

Use this collection of workbooks to create a vendor security assessment for low, medium, and high-risk vendors.

Service Risk Assessment Questionnaire

Use this Excel-based tool to develop a product/service risk assessment and assign a risk rating.

Vendor Security Process Diagram

This visual flowchart will guide you through the steps of engaging with vendors.

Vendor Security Process Template

Use this Word-based template to manage workflow, RACI matrices, and risk requirements.

Vendor Security Policy Template

This in-depth template will help you tailor your vendor security policy to your organization.

Build Adaptive Security Services

Shift from reactive defense mechanisms to proactive, strategic, and business-aligned security services that will demonstrate the value and ROI of security services to your...

Uptycs: Your Swiss Army Knife for CNAPP Solutions

As more organizations move to a cloud-first or hybrid deployment model, the protection of cloud-native applications is of the utmost importance. This tech note explores how...

Get Started With AI Red-Teaming

The double-edged AI revolution has brought tangible benefits for IT but also opportunities for threat actors to deploy more sophisticated and varied cyberattacks.

Get Started With AI Red-Teaming Storyboard

Use this deck to plan your approach to AI red-teaming, execute your AI red-teaming exercise in a way that makes sense for your organization, and build the right guardrails...

Threat Landscape Briefing – April 2025

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control strategies and exposure...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us