Security Risk, Strategy & Governance

Determine Your Zero Trust Readiness

Traditionally, IT security was typified by perimeter security, like you would see in a castle and moat, where if you could get through the front gates, you were trusted...
  • guided implementation icon

The First 100 Days as CISO – Executive Brief

Read this Executive Brief to understand Info-Tech's five-step approach to conquering your first 100 days as a CISO.

RiskSense Releases a Unified Infrastructure Security Risk Management Program

RiskSense announced on July 13 its new version of the cloud-delivered RiskSense risk management platform. The main draw of the program is its holistic risk calculation...

TrustArc Teams Up With BigID

TrustArc is partnering with BigID to add protection of sensitive data to its roster of data privacy and compliance capabilities. The move closely follows a partnership...

Qualys and Ivanti Partnership Boasts an Incredibly Robust Vulnerability Management Platform

Qualys VMDR and Ivanti have announced a new partnership dedicated to improving the detection and patching of vulnerabilities. Announced July 30, the Qualys and Ivanti...

Remote Work Landscape Pushes Microsoft to Releases Endpoint DLP and Double Key Encryption Features for Added Data Security

Microsoft recently previewed the specific features to tackle data security and risk management for end users with Microsoft Endpoint Data Loss Prevention (DLP) and Double...

Twilio Breach and Cloud Security

By exploiting a five-year-old configuration error, a hacker was able to access Amazon’s S3 cloud storage buckets on which Twilio’s code was loaded. As a result, customers...

Webinar: Reduce Risks With a Quantitative Approach to Privacy Compliance

The privacy compliance landscape is constantly shifting. Learn how to take a quantitative, operational approach to reducing your organization's privacy risk.

The First 100 Days as CISO

Your first 100 days are the ultimate predictor of your long-term success. Make it count by following Info-Tech's five-step approach.
  • guided implementation icon

Assess Your Cybersecurity Insurance Policy

Assess your industry vertical for the most likely threats and risks (i.e. the things the policy must provide coverage for). Perform a business impact analysis to estimate...
  • guided implementation icon
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us