Security Risk, Strategy & Governance

Security Policy Exception Approval Workflow

Use this workflow to help you formalize and document your policy exception approval process.

Air Canada's Temperature Testing Raises Concern for Individual Data Privacy, Explained by a Privacy Expert

In an interview with Info-Tech analysts, privacy expert Dr. Ann Cavoukian explains why Air Canada's recent mandatory temperature check policy to screen for COVID-19...

PHEMI: A Data Privacy Tool for Healthcare Providers

PHEMI is a data privacy solution focused on keeping data-processing activities secure by redacting information based on the role of the accessor. Thus, allowing such data...

Webinar: Responsibly Resume IT Operations in the Office

IT must quickly identify the must-dos to allow a safe return to the office. During this webinar we will go through how to build a prioritized roadmap for safe reopening...

Kenna Security Offers Vulnerability Management Options: Kenna.VM & Kenna.VI

Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created...

Workiva and CFGI to Collaborate in the SOX and GRC Space

“Connected reporting capabilities, control testing, real-time collaboration, cloud-based access, stringent security measure and permissions controls” are considered the...

Rapid7 Penetration Tests Show That Businesses Are Getting Better at Network Security

We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at...

Responsibly Resume IT Operations in the Office – Executive Brief

As the post-pandemic landscape begins to take shape, ensure that IT can effectively prepare and support your employees as they return to the office.

Responsibly Resume IT Operations in the Office – Phases 1-5

As the post-pandemic landscape begins to take shape, ensure that IT can effectively prepare and support your employees as they return to the office.

Responsibly Resume IT Operations in the Office – Phase 4: Repatriate Workloads to the Office

Prepare and position IT to support workloads in order to streamline office reintegration. This may include leveraging pre-existing solutions in different ways and...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us