|
This Excel tool gives you a comprehensive method to shortlist top vendor candidates.
|
|
|
An Excel-based scenario-mapping tool to score the likelihood and impact of deepfake risks in your organization.
|
|
|
A detailed workbook to help identify the current and target state of your security program.
|
|
|
Discover and document AI investments to assess compliance status, identify gaps, and prioritize actions for effective governance.
|
|
|
Use this tool to determine your organizational tolerance for security risk.
|
|
|
Use this tool to document the roles and responsibilities of your security risk management activities.
|
|
|
Use this tool to assess the current and target maturity of your security risk management program.
|
|
|
The Security Program Implementation Tool will help you assess the current state of different security program components and plan program improvements.
|
|
|
Leverage PIAs to empower your AI technology by integrating protection and management of personal data at scale.
|
|
|
This tool provides a plan for organizations to create and track the development of their cybersecurity competencies.
|
|