This monthly recording covers topics such as cyberthreat trends, nation-states, cybercriminals, hacktivists campaigns, data breaches, control strategies, and exposure to...
|
|
This Privacy Regulation Roundup summarizes the latest major global privacy regulatory developments, announcements, and changes. This report is updated on a monthly basis.
|
|
This monthly recording covers topics such as cyberthreat trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control strategies, and exposure...
|
|
This Excel database maintains an inventory of all known vendors and the results of their last known security assessments.
|
|
This storyboard will help you define and plan your journey to implementing a right-sized vendor security assessment process.
|
|
This in-depth template will help you tailor your vendor security policy to your organization.
|
|
As organizations increasingly rely on third-party vendors to support critical objectives, they also open themselves up to more security risks and points of entry for...
|
|
Use this Excel-based tool to develop a product/service risk assessment and assign a risk rating.
|
|
Use this collection of workbooks to create a vendor security assessment for low, medium, and high-risk vendors.
|
|
This visual flowchart will guide you through the steps of engaging with vendors.
|
|