All Research

Security Budgeting Tool

This tool will allow you to build a security budget that maps security controls to the business capabilities they enable, while creating three different budget options...

Build, Optimize, and Present a Risk-Based Security Budget – Phase 3: Present the Budget

This phase of the blueprint, Build, Optimize, and Present a Risk-Based Security Budget, will help you take your completed budget and communicate the value of security to...

Preshopping Security Budget Presentation Template

This template will help you build a presentation in order to perform “preshopping” with stakeholders. Preshopping is when you speak with stakeholders prior to the final...

Final Security Budget Presentation Template

This template will help you build a final budget presentation that you can deliver to stakeholders to gain final budgetary approval.

Indirect Access of SAP Systems May Cost You Millions

A recent UK court ruling in favor of SAP v. Diageo, a global drinks company, may broadly define the rules of indirect access of SAP software. Indirect access of SAP...

Vendor Scorecard

Assess vendors regularly with useful metrics to optimize your vendor portfolio.

Controlled Vendor Communications Letter

Establish a single point of contact and create a communication vacuum to help leverage your negotiation position.

Global Flows and Disruptions: From the Economy to the Environment

As we were realizing that we had discovered the two primary actions underlying literally everything else in the world, I had the chance to talk with Bill Janeway about...

Enablers and Vectors: Accelerating Innovation Deployment, Part II – Unicorns and Profitless Disruptions

In this week's discussion, I will take a look at the part of Valley startup culture that gets almost all of the outside attention, and a gigantic fraction of investor...

Embrace Information Lifecycle Management in Your ECM Program

Not all information assets are created equal; you need a structured approach to handling your organization’s information assets from creation to destruction that...
  • guided implementation icon
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us