Threats of Open-Source AI

Anyone can manipulate open-source AI for nefarious and criminal purposes, which poses threats at the highest level. Organizations need new threat models to be ready for bad...

TRA Process Map

Use this template to document your threat and risk assessment process.

Assess and Manage Security Risks – Phases 1-4

Use this blueprint to lay down the foundations for security risk management, including governance, assessment, and risk treatment.

Assess and Manage Security Risks

A mature security risk management practice is a critical component of a comprehensive and risk-aware information security program. Use this blueprint to effectively...
  • guided implementation icon

Security Threat and Risk Assessment Tool

Use this tool to identify and assess security threats and risks against a system or application.

Security Risk Management RACI Tool

Use this tool to document the roles and responsibilities of your security risk management activities.

Security Risk Management Maturity Assessment Tool

Use this tool to assess the current and target maturity of your security risk management program.

Security Threat and Risk Assessment Process Template

Use this template to document the overall process and structure of your security risk assessment program.

Security Risk Tolerance Assessment Tool

Use this tool to determine your organizational tolerance for security risk.

Custom Vendor Landscape: Third-Party Risk Management Solutions Second Edition

Info-Tech defines Third-Party Risk Management as a solution that evaluates and monitors of risk of third-party vendors, contractors and consultants.
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us