|
Use these definitions as a starting point to develop an IT risk taxonomy appropriate for your organization.
|
|
|
Leverage this tool as a starting point to develop risk levels and definitions appropriate to your organization.
|
|
|
Use this workbook to document outcomes of activities and brainstorming sessions conducted as part of the blueprint Build an IT Risk Taxonomy.
|
|
|
Use this tool to help identify and quantify the security impacts of negative vendor actions.
|
|
|
Use this research to better understand the negative impacts of third-party vendor actions on your organization.
|
|
|
It is time to start looking at risk realistically and move away from “trust but verify” toward zero trust.
|
|
|
Organizations must diligently assess and protect their reputations, both in the market and internally.
|
|
|
Use this tool to help identify and quantify the reputational impacts of negative vendor actions.
|
|
|
Use this research to better understand the negative impacts of vendor actions on your brand reputation.
|
|
|
Use this tool to help identify and quantify the financial impacts of negative vendor actions.
|
|