Perform a legitimate interest assessment when legitimate interest is used as the lawful basis for business processes under GDPR.
|
|
KnowBe4, a leader in end-user security training, has acquired El Pescador, a Brazilian security awareness and training company. This could be a good fit if you are...
|
|
Plot your findings from the Workbook and Archive Document to see the current state of your cloud security architecture, the risks, and where you still need to go.
|
|
Use Info-Tech's Executive Presentation Template to present your diagnostic report findings and next steps.
|
|
Use Info-Tech's Diagnostic Benchmarks: Security Business Satisfaction Report Tool to compare your results against your peers.
|
|
Organizations need security programs that are holistic, risk-aware, and business-aligned. Watch this webinar to learn how to create a successful security strategy.
|
|
ISACA has partnered with InfoSec Institute to produce a whitepaper on leveraging marketing techniques and metrics to improve security awareness. This is a valuable...
|
|
KnowBe4, a leader in end-user security training, has begun the authorization process for the Federal Risk and Authorization Management Program (FedRAMP). This is yet...
|
|
According to Citrix and Resecurity, attackers exploited weak passwords and bypassed multi-factor authentication to obtain Citrix’s business documents.
|
|
This storyboard will help you set up your steering committee and identify the key players, their responsibilities and the capabilities of your committee.
|
|