Identity Security Architecture Tool

A structured tool to help you inventory identity types, threats, and mitigations using the MITRE ATT&CK® framework.

Identity Security RACI Chart

A best-of-breed template to help you document roles and responsibilities related to identity security.

Assess and Govern Identity Security – Phases 1-2

A step-by-step document that walks you through how to properly inventory your identity types, repositories, threats, and mitigations.

Assess and Govern Identity Security

Security leaders view modernizing identity security as too daunting and prefer to focus on narrower technology challenges. This limited focus is reactive and, in the long...
  • guided implementation icon

Threat Landscape Briefing – November 2021

This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals and hacktivists campaigns, data breaches, control strategies,...

Threat Landscape Briefing – October 2021

This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals and hacktivists campaigns, data breaches, control strategies,...

Data Privacy Program Report

This template outlines the operations of your organization's data privacy program by presenting specific metrics across all twelve areas of data privacy, in a digestible...

Data Processing Agreement Template

Use this template to formalize and document your data controller and processor obligations.

Standard Contractual Clauses Template

Use this template to help you formalize your process for cross-border data transfer.

Mature Your Privacy Operations – Phases 1-6

Use this storyboard to guide your privacy program maturation. This project should be started after the completion of Build a Data Privacy Program.
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us