Security Technology & Operations

Mature Your Identity and Access Management Program

Weak identity and access management (IAM) practices result in considerable risk to the organization because IAM plays a role in most things in IT. Info-Tech provides a...
  • guided implementation icon

Mature Your Identity and Access Management Program – Executive Brief

Read our concise Executive Brief to find out how you improve the organization's Identity and Access Management practices using Info-Tech’s methodology, and understand the...

Mature Your Identity and Access Management Program – Phases 1-3

This storyboard will help you improve the organization's identity and access management practices by using the Identity Lifecycle as a framework.

IAM Initiative Tool

This tool will allow you to identify, document, prioritize, and roadmap initiatives for improving the organization's identity and access management practices.

Threat Landscape Briefing – October 2020

This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals and hacktivists campaigns, data breaches, control...

Respond to the SolarWinds Compromise

The extent and sophistication of this attack are staggering, and IT Security must be fully informed and take action immediately.

Post-Incident Review Questions Tracking Tool

Use this template to help you determine the key questions that need to be answered at your post-incident review.

Threat Landscape Briefing – February 2021

This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals and hacktivists campaigns, data breaches, control...

Nearly Half of Businesses Are Struggling With Cloud Costs

Avoiding sticker shock isn’t the only reason to reduce cloud costs.

Lessons From the Microsoft Exchange Server Attack

State-sponsored cybercrime rears its ugly head – again.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us