Security Incident Management Runbook: Data Breach

Use this template to help you develop an incident-specific runbook and accompanying workflows.

Proofpoint SOARs Above the Rest With Award-Winning Security Orchestration, Automation, and Response

Proofpoint’s Threat Response has claimed the Cybersecurity Excellent Awards Gold Winner for 2019 in the Incident Response category.

Demisto Acquired by Palo Alto Networks for $560M

Security orchestration, automation, and response (SOAR) firm, Demisto, was acquired by Palo Alto Networks in March as Palo Alto aims to strengthen its commitment to...

No Surprise: New Survey Confirms That Most Organizations Are Ineffective at Third-Party Risk Management

A new report published by the Ponemon Institute confirms that organizations are spending an increasing amount on third-party risk management, but are failing to realize...

SecurityScorecard Admits That Third Party Risk Management Is Hard and Announces Professional Advisory Services

SecurityScorecard has announced the availability of new professional advisory services to help customers consume its vendor cyber risk rating product. In doing so, it is...

OneTrust Launches Vendorpedia, a Combined Security and Privacy Third-Party Risk Exchange

At the 2019 RSA Conference, OneTrust announced Vendorpedia, billed as the only security and privacy third-party risk exchange. However, it will need to increase its...

RiskRecon and RSA Announce Partnership to Bring Cyber Risk Ratings to Archer GRC Customers

​RiskRecon and RSA have announced a partnership to bring RiskRecon’s third-party risk rating services to RSA’s Archer Governance, Risk and Compliance (GRC) system. This...

BitSight Announces New Cyber Risk Score Benchmarking Service

BitSight, one of the leaders in cyber risk rating, has announced a new product to allow organizations to benchmark against their peers. Dubbed “Peer Analytics,” this...

Risk Management Case Study of a Small University

A small university in the American mid-west needed to introduce its IT stakeholders to key risk concepts as part of a new, broader IT governance mission. By gaining a...

Service Risk Assessment Questionnaire

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, to assess the risk associated with purchasing a product or service.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
Contact Us