This Excel database maintains an inventory of all known vendors and the results of their last known security assessments.
|
|
Use this collection of workbooks to create a vendor security assessment for low, medium, and high-risk vendors.
|
|
Use this Excel-based tool to develop a product/service risk assessment and assign a risk rating.
|
|
This phase of the blueprint, Build a Vendor Security Assessment Service, will help you develop procedures and tools to assess vendor risk.
|
|
Info-Tech's Security Policy templates allow you to easily develop new policy documents.
|
|
A small university in the American mid-west needed to introduce its IT stakeholders to key risk concepts as part of a new, broader IT governance mission. By gaining a...
|
|
A 20-person IT department in a mid-sized regional grocery retailer received a mandate from its Board of Directors to reapproach and increase its risk management activities....
|
|
This phase of the blueprint, Master Your Security Incident Response Communications Program, will help you to develop strategies for both internal and external communications.
|
|
This phase of the blueprint, Master Your Security Incident Response Communications Program, will help you understand the benefits and challenges and get the communications...
|
|
This blueprint will help you to develop an effective strategy for communicating with internal and external stakeholders during a security incident, as well as how to...
|
|