Security & Privacy Research Center
A holistic approach to building an agile, robust security program.
Talk to an Analyst
View the IT Management & Governance Framework
Great Security Starts With a Great Strategy
Security threats continuously adapt in a battle to circumvent our defenses. When security teams find themselves trapped in a cycle of reacting to every new threat, it is only a matter of time before those defenses are breached. With security and privacy strategies to guide you, it becomes much easier to take a proactive approach to building the capabilities you need to defend your organization. Our security and privacy research center can get you started and put you on the path to proactive cybersecurity.
Security & Privacy Strategy
Start with strategy. Define what security and privacy capabilities are required by the organization and outline their corresponding priorities.
Start HereSecurity Management
Build effective programs and procedures to manage governance, risk, and compliance within your organization.
Start HerePrivacy Program Management
Build an effective privacy program, secure your data assets, and manage privacy compliance.
Start HereSecurity Operations
Improve processes and procedures to identify, protect, detect, and respond to security incidents.
Start HereIdentity & Access Management
Protect your organization and employees through effective identity and access management.
Start HereAPO13
Security and Privacy Strategy
Start with strategy. Define what security and privacy capabilities are required by the organization and outline their corresponding priorities.
Security Strategy & Program Design
Build the Security Organization



TRAINING: Upskill your IT team by going beyond certifying knowledge to assuring competence
Cybersecurity Workforce DevelopmentFoster a Security Culture


Find the right tools to power your security awareness and training program.
Security Awareness & Training ToolsDSS05
Security Management
Build effective programs and procedures to manage governance, risk, and compliance within your organization.
Establish Security Management
Establish Security Governance
Manage Security Risk


Find the right GRC software providing an overview of your organization’s governance, risk, and compliance.
Governance, Risk, and Compliance (GRC) SoftwareITRG06
Privacy Program Management
Build an effective privacy program, secure your data assets, and manage privacy compliance.
Build a Privacy Program



Find the right privacy program management tools to achieve and maintain data protection compliance.
Privacy Program Management SoftwareManage Privacy Compliance


DSS05
Security Operations
Improve processes and procedures to identify, protect, detect, and respond to security incidents.
Manage Networks & Endpoint Security


Endpoint detection & response (EDR) software mitigates malicious software.
Endpoint Detection and Response ToolsManage Cloud Security


Find the right cloud access security broker (CASB) software to enforce security policies in the cloud.
Cloud Access Security Broker (CASB) SoftwareManage Vulnerabilities
Manage the security of your network and applications with the best vulnerability management software.
Vulnerability Management Tools:
DSS05, DSS06
Identity and Access Management
Protect your organization and employees through effective identity and access management.
Manage Identities & Access


Identity Access