TRA Process Map

Use this template to document your threat and risk assessment process.

Security Risk Tolerance Assessment Tool

Use this tool to determine your organizational tolerance for security risk.

Security Risk Management RACI Tool

Use this tool to document the roles and responsibilities of your security risk management activities.

Custom Vendor Landscape: Third-Party Risk Management Solutions Second Edition

Info-Tech defines Third-Party Risk Management as a solution that evaluates and monitors of risk of third-party vendors, contractors and consultants.

Custom Vendor Landscape: Third-Party Risk Management Solutions

Third-party risk management (TPRM) solutions identify, manage, and mitigate risks related to third parties, including vendors, suppliers, partners, contractors, and service...

Protect Your Organization's Online Reputation

Understanding what your online reputation is can go a long way to understanding and improving your business. Don’t be caught by surprise. Gain control of your...

Generative AI Risk Map

Use this tool to determine your data-security risks and recommended policy statements for using generative AI.

AI Security Policy Template

Use this policy template as the basis of your AI security policy.

Address Security and Privacy Risks for Generative AI Storyboard

This research will help security leaders seeking to better understand the risks associated with using generative AI and will walk them through how to manage those risk in...

Address Security and Privacy Risks for Generative AI

This research will help security leaders seeking to better understand the risks associated with using generative AI and will walk them through how to manage those risk in...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us