Use this template as the one document where your metrics and their definitions live, and update it as needed.
|
|
Organizations face an ever-evolving range of cyberthreats. It is crucial to have a security incident management program to detect, respond, and recover from security...
|
|
Lenovo’s strategy to pre-install the Superfish application on some consumer devices was fundamentally irresponsible and a squander of customers’ trust.
|
|
The In-House vs. Outsourcing Decision-Making Tool is designed to help organizations analyze the cost and risk management effectiveness for security capabilities with...
|
|
Info-Tech's Security Policy templates allow you to easily develop new policy documents.
|
|
Use this template to document the specific security requirements of your potential SaaS vendor.
|
|
This template is designed to provide EPP vendors with a consistent set of instructions, ensuring an objective comparison of product features, all while evaluating ease of...
|
|
This is a brief research note for Info-Tech’s members about the Heartbleed bug, i.e. the first security vulnerability with worldwide impact and response. Understand which...
|
|
A 20-person IT department in a mid-sized regional grocery retailer received a mandate from its Board of Directors to reapproach and increase its risk management...
|
|
A small university in the American mid-west needed to introduce its IT stakeholders to key risk concepts as part of a new, broader IT governance mission. By gaining a...
|
|