Security Technology & Operations

Build a Vendor Security Assessment Service – Phase 2: Develop Assessment Methodology

This phase of the blueprint, Build a Vendor Security Assessment Service, will help you develop procedures and tools to assess vendor risk.

Service Risk Assessment Questionnaire

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, to assess the risk associated with purchasing a product or service.

Vendor Security Questionnaire

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to develop a questionnaire for potential vendors to assess their...

Vendor Security Assessment Inventory

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to inventory vendors and the results of their security assessments.

Build a Vendor Security Assessment Service – Phase 3: Deploy and Monitor Process

This phase of the blueprint, Build a Vendor Security Assessment Service, will help you implement the process and develop metrics to measure effectiveness.

Vendor Security Requirements Template

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to provide potential vendors with contractual requirements related...

Security Incident Communications Policy Template

Use this policy template to help define your organization's procedures and expectations surrounding incident response communications.

Security Incident Communications Guidelines and Templates

Use these guidelines and templates to help draft your organization's communications plan.

Simplify Identity and Access Management

This research will lay the groundwork for establishing a centralized, effective, and efficient system for managing identity and access. We will help organizations take...
  • guided implementation icon

Simplify Identity and Access Management – Phases 1-4

This storyboard will help you lay the groundwork for establishing a centralized, effective, and efficient system for managing identity and access. Simplify your identity...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us