Use this tool to build your target state information security governance and management framework and conduct a gap analysis.
|
|
Your managed IT service providers may be leaving you vulnerable.
|
|
This Info-Tech briefing will provide a synopsis of what the Shadow Brokers leak might mean for users and organizations, and what actions can be taken in response to this...
|
|
Use this tool to determine your organization’s security training and awareness needs to begin building your training and awareness program.
|
|
Use this template to document the specific security requirements of your potential IaaS or PaaS vendor.
|
|
This tool will help you build a security metrics program.
|
|
What do the Vault 7 releases mean for you? (And what do they NOT mean.)
|
|
Use this template to outline how an organization’s end users can securely use cloud services through acceptable usage guidelines.
|
|
Identify relevant metrics to assist in evaluating the success of your organization's endpoint protection process.
|
|
The Cloud Security CAGI Tool follows a custom framework in which an organization's cloud risk profile is analyzed to produce unique recommendations.
|
|