Security Risk, Strategy & Governance

Build, Optimize, and Present a Risk-Based Security Budget – Phase 1: Review Requirements for the Budget

This phase of the blueprint, Build, Optimize, and Present a Risk-Based Security Budget, will help you gather the requirements needed and review them to ensure you can...

LogicGate GRC

LogicGate is a governance, risk and compliance automation platform offered by LogicGate Inc., headquartered in Chicago, that helps organizations to automate their risk...

Achieve Digital Resilience by Managing Digital Risk – Executive Brief

Digital risk exists in many new strategic initiatives and innovative projects, regardless of your industry and location. Through an amalgamation of enterprise, IT, and...

Embed Privacy and Security Culture Within Your Organization

A strong security program and privacy framework are fundamental to successful organizations and require a proactive approach that embeds principles in the operational...
  • guided implementation icon

Embed Privacy and Security Culture Within Your Organization – Executive Brief

Privacy and security are two heavy-hitting items that all organizations need to account for. Technical controls are a start, but privacy and security need to become part...

Onspring Interview

I recently had the opportunity to speak with Jason Rohlf, VP Solutions, Mark Scheinkoenig, VP Commercial Sales, and Emily Figg, VP Marketing about their GRC solution at...

Build a Security Compliance Program – Phases 1-5

Read this blueprint to help build a cost-effective information security compliance management program.

Build a Security Compliance Program – Executive Brief

Read this executive brief to understand how an information security compliance management program can be cost effective.

Build a Security Compliance Program

Mastering a cost-effective approach to cybersecurity and data protection compliance can provide organizations with a clear strategic advantage. Take control of your...
  • guided implementation icon

Data Security Executive Report

Focus on the key metrics your senior leadership team wants to see. Use this executive report template to show how the organization's high-risk data is being secured.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us