Security Technology & Operations

RBAC Implementation Workbook

Use this tool to build a role-based access control model for your organization. This tool also provides version control and metrics tabs to assist with long-term maintenance.

IAM Task Prioritization Tool

Use this tool to document and prioritize the tasks required to complete and implement the role-based access control model.

Build a Vendor Security Assessment Service

Risks from third parties are on the rise, but many organizations still struggle with how to tackle this problem. A risk-based approach is needed to manage supply chain...
  • guided implementation icon

Build a Vendor Security Assessment Service – Executive Brief

Read this Executive Brief to understand why vendor security risk management is becoming an increasing concern for companies and regulators, and what you can do about it.

Embed Security Into the DevOps Pipeline

Transcend traditional application security approaches and embrace the agile mindset to shift security left. Use innovation and automation to secure the DevOps pipeline...
  • guided implementation icon

Embed Security Into the DevOps Pipeline – Phase 1: Identify Opportunities

This phase of the blueprint, Embed Security Into the DevOps Pipeline, will help you brainstorm potential opportunities for securing DevOps.

Embed Security Into the DevOps Pipeline – Phases 1-2

This storyboard will help you transcend traditional application security approaches and embrace the agile mindset to shift security left towards DevSecOps.

Embed Security Into the DevOps Pipeline – Executive Brief

Read this Executive Brief to understand DevOps and how to secure the development pipeline.

SecurityScorecard Launches Project Escher to Aid Non-Profits With Vendor Risk Management

SecurityScorecard, a leader in vendor cyber risk rating, has announced an initiative to help non-profit organizations with third-party risk management. Named Project...

Privacy Regulation Roundup

This Privacy Regulation Roundup summarizes the latest major global privacy regulatory developments, announcements, and changes. This report is updated on a monthly basis.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us