I recently had the opportunity to speak with Jason Rohlf, VP Solutions, Mark Scheinkoenig, VP Commercial Sales, and Emily Figg, VP Marketing about their GRC solution at...
|
|
Navigating the vendor risk management space, particularly in the current environment that consists of a mix of cloud, managed services, and critical supply chain, is key...
|
|
By exploiting a five-year-old configuration error, a hacker was able to access Amazon’s S3 cloud storage buckets on which Twilio’s code was loaded. As a result, customers...
|
|
Assess your industry vertical for the most likely threats and risks (i.e. the things the policy must provide coverage for). Perform a business impact analysis to estimate...
|
|
This blueprint will help you to prioritize the threats you need insurance coverage for, how much coverage is necessary for your organization, and which of your...
|
|
Use this blueprint to score your potential cyber insurance policies and develop skills to overcome common insurance pitfalls.
|
|
Many organizations have cybersecurity policies in place but are unsure of their effectiveness. Learn how Info-Tech can help improve your policy suite to align with best...
|
|
This research is designed to help organizations who are preparing for a merger or acquisition and need help with understanding the information security risks associated...
|
|
Read this Executive Brief to understand how this blueprint can help you prepare for a merger or acquisition and understand the information security risks associated with...
|
|
Use this tool to identify key security controls required by cyber insurance providers.
|
|