Nymity Adds Data Subject Requests to Its List of Solutions

Nymity expands its product offering with the introduction of a new Data Subject Requests product.

Launch of Awareness Tracker by Nymity Signals a New Era of Privacy Software

Nymity expands its product offering with the introduction of new privacy compliance solutions.

Nymity’s Research & Alerts Receive Revamp

Privacy solution Nymity expands its product offering with the introduction of Next Generation Research & Alerts.

Small Enterprise SituAction: A New CIO Prepares for M&A

Mergers and acquisitions are challenging for many IT leaders in small enterprises. Use Info-Tech’s resources to assist with appropriate due diligence and prepare for...

Small Enterprise SituAction: Building out IT Security Policies

An IT leader in a growing municipality needs to take a proactive approach to security and build out its policies. Info-Tech’s blueprints and templates save them time and...

Combine Security Risk Management Components Into One Program

IT departments are tasked with implementing new projects, but are often unsure how to assess the risk. Often, they use informal discussions that do not allow the business...
  • guided implementation icon

Risk Tolerance Determination Tool

This tool helps you determine risk tolerance level to guide future assessments and accurately identify unacceptable risks.

Threat and Risk Assessment Process Template

Use this template to document the exact process your organization uses when conducting a threat and risk assessment.

Threat and Risk Assessment Tool

Use this tool to assess the threat and risk severity with any particular IT project or initiative.

Security Risk Register Tool

This tool will allow you to collect, analyze, and combine individual risks and view the aggregate level of risk within the organization, including how it compares to your...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us