Vendor Security Policy Template

This in-depth template will help you tailor your vendor security policy to your organization.

Build a Vendor Security Assessment Service – Phases 1-3

This storyboard will help you define and plan your journey to implementing a right-sized vendor security assessment process.

Build a Vendor Security Assessment Service

As organizations increasingly rely on third-party vendors to support critical objectives, they also open themselves up to more security risks and points of entry for...
  • guided implementation icon

Vendor Security Requirements Template

Use this easily-customizable template to establish security requirements for engaging with vendors.

Uptycs: Your Swiss Army Knife for CNAPP Solutions

As more organizations move to a cloud-first or hybrid deployment model, the protection of cloud-native applications is of the utmost importance. This tech note explores how...

Threat Landscape Briefing – April 2025

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control strategies and exposure...

Threat Landscape Briefing – March 2025

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, hacktivists campaigns, data breaches, control strategies, and exposure to...

Cross-Network Contagion – Moderate BCDR and Security Scenario

An example tabletop scenario that can be used for a tabletop exercise.

Phishing Frenzy – Simple Security Scenario

An example tabletop scenario that can be used for a tabletop exercise.

Room for Risk – Moderate Security Scenario

An example tabletop scenario that can be used for a tabletop exercise.
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us