Security Risk, Strategy & Governance

Discover and Classify Your Data – Phase 2: Discover the Data

This phase of the blueprint will help you perform and manage data discovery.

Data Audit Interview Schedule

​Use the Data Audit Interview Schedule to ensure you organize interviews with the proper data audit participants.

Email Security Gateway RFP Template

Issuing an RFP to vendors is a critical step in your email security gateway solution selection process.

Email Security Gateway Vendor Demo Script

Allowing vendors to run a product demonstration without your guidance will only highlight their strengths and present a subjective and skewed view of their product offering.

Avoid the Next Heartbleed

This is a brief research note for Info-Tech’s members about the Heartbleed bug, i.e. the first security vulnerability with worldwide impact and response. Understand which...

Establish Effective Security Governance & Management – Phases 1-2

Use this storyboard to develop an information security governance and management model and implement essential governance processes.

Data Audit Scorecard

The Data Audit Scorecard identifies the areas in which the health of your data can be modified for improvement. Use this template to see where you fall short so you can...

Lenovo, Superfish, MITM attacks, and SSL Interception: the Bigger Picture

Lenovo’s strategy to pre-install the Superfish application on some consumer devices was fundamentally irresponsible and a squander of customers’ trust.

Email Security Gateway Vendor Shortlist & Detailed Feature Analysis Tool

This worksheet allows enterprises to profile their email security gateway (ESG) requirements and generate a rank-ordered vendor shortlist from a fixed list of vendors....

Security Metrics Summary Document

Use this template as the one document where your metrics and their definitions live, and update it as needed.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us