A detailed Excel workbook designed to help you understand where you stand with your security capabilities.
|
|
Use this easily-customizable template to establish security requirements for engaging with vendors.
|
|
This Excel database maintains an inventory of all known vendors and the results of their last known security assessments.
|
|
Use this Excel-based tool to develop a product/service risk assessment and assign a risk rating.
|
|
Use this collection of workbooks to create a vendor security assessment for low, medium, and high-risk vendors.
|
|
A tool designed to help you leverage generative AI to produce realistic and relevant scenarios for a tabletop exercise.
|
|
A tool designed to help you assess your requirements for tabletop planning.
|
|
Use this tool to document the roles and responsibilities associated with managing identities and access in your organization.
|
|
Use this tool to document the overall business, security, and privacy requirements related to your identity and access management program.
|
|
Use this tool to conduct a comprehensive assessment of your IAM program and develop a roadmap toward your target state.
|
|