Tagged - information security

BitSight Announces New Cyber Risk Score Benchmarking Service

BitSight, one of the leaders in cyber risk rating, has announced a new product to allow organizations to benchmark against their peers. Dubbed “Peer Analytics,” this...

KnowBe4 Expands Into Brazil With the Purchase of El Pescador From Tempest

KnowBe4, a leader in end-user security training, has acquired El Pescador, a Brazilian security awareness and training company. This could be a good fit if you are...

SecurityScorecard Launches Project Escher to Aid Non-Profits With Vendor Risk Management

SecurityScorecard, a leader in vendor cyber risk rating, has announced an initiative to help non-profit organizations with third-party risk management. Named Project...

Build a Vendor Security Assessment Service – Phase 3: Deploy and Monitor Process

This phase of the blueprint, Build a Vendor Security Assessment Service, will help you implement the process and develop metrics to measure effectiveness.

Build a Vendor Security Assessment Service – Phase 2: Develop Assessment Methodology

This phase of the blueprint, Build a Vendor Security Assessment Service, will help you develop procedures and tools to assess vendor risk.

Build a Vendor Security Assessment Service – Phase 1: Define Governance and Process

This phase of the blueprint, Build a Vendor Security Assessment Service, will help you determine your business requirements and build your process to meet them.

Build a Vendor Security Assessment Service – Executive Brief

Read this Executive Brief to understand why vendor security risk management is becoming an increasing concern for companies and regulators, and what you can do about it.

Build, Optimize, and Present a Risk-Based Security Budget

Security budgets are unlike other department budgets. Increases or decreases in the budget can drastically affect the organizational risk level. Info-Tech’s methodology...
  • guided implementation icon

Business Requirement Security Strategy Mapping Tool

Use this tool to map business and IT initiatives to specific security mitigation controls. This tool is a documentation and mapping support tool as part of your larger...

Information Security Communication Plan Template

Communication between security and the rest of the business can be difficult because the two parties often speak different languages. Your security messages should be...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us