|
Use this easily-customizable template to establish security requirements for engaging with vendors.
|
|
|
Use this collection of workbooks to create a vendor security assessment for low, medium, and high-risk vendors.
|
|
|
This Excel database maintains an inventory of all known vendors and the results of their last known security assessments.
|
|
|
An Excel-based template to help you identify and analyze your device personas.
|
|
|
An Excel-based development tool to help you implement your enterprise device management strategy.
|
|
|
Use this detailed workbook to establish your automation goals, assess the maturity of your IT infrastructure and operations processes, and determine where automation would...
|
|
|
Build a repository of all the AI risks identified in your environment with the responsible owner, category, and planned actions for each risk.
|
|
|
Structure a comprehensive risk assessment for all current and potential AI risks in your organization.
|
|
|
Analyze your organization’s current- and target-state maturity in AI capabilities and systematically develop a plan for your target AI practices.
|
|
|
A structured tool to help you prioritize which pricing models build the correct roadmap to ensure success.
|
|