All Research

Security Incident Management Runbook: Malicious Email

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Security Incident Management Runbook: Distributed Denial of Service

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.ni

Security Incident Management Runbook: Credential Compromise

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Develop and Implement a Security Incident Management Program – Phases 1-3

Organizations face an ever-evolving range of cyberthreats. It is crucial to have a security incident management program to detect, respond, and recover from security...

Develop and Implement a Security Incident Management Program

Organizations face an ever-evolving range of cyberthreats. It is crucial to have a security incident management program to detect, respond, and recover from security...
  • guided implementation icon

LG TVs, Apple Vision Pro & The Rise of Invisible Technology

The new gold standard for product design is invisibility. This week, we explore what that means, how it's popping up across consumer products, and how it will impact the...

Technology Service Provider Industry Business Reference Architecture Template

Use this template as a starting point to develop your own custom capability map.

Technology Service Provider Industry Business Reference Architecture Guide

Use this guide to learn how to develop a custom business capability map and reference architecture for your technology service provider firm.

Technology Service Provider Industry Business Reference Architecture

This business reference architecture provides a capability-driven analysis and template that can be used to guide the decision-making process while implementing...

Prepare for Your First Jump Into AI for Marketing and Sales by Minimizing Risk

Should B2B technology companies change their timelines for the use of AI in marketing, sales, and customer success?
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us