REGISTER

Risk Management

pdf Download (5.43 MB)

In this guide we dive into the top 5 steps to building out a modernized third-party risk management program.

 

CCTNacl default Download

This guide is designed to help you start building key risk indicators and put them to good use at your organization, from the most basic dashboard all the way up to advanced monitoring and automation techniques.

ectn default Download

Learn how to implement the recommendations in SP 800-161 for Device Supply Chain Security using a Supply Chain Security platform.

CCTNacl default Download

This guide illuminates the crucial process of assessing and quantifying cyber risks in the modern business landscape.

CCTNacl default Download

This paper explores how organizations can protect themselves from firmware-based attacks, such as DMA attacks, by implementing Zero Trust principles.

cyolotn pdf Download (4.71 MB)

Discover the hidden risks of third-party access and the dependence of modern businesses on external vendors.

protecht pdf Download (4.80 MB)

In this ebook, we will share our experiences, lessons learned, and guidance for benchmarking.

CCTNaclDownload

Much has been written about hardening enterprises against the threat of ransomware, but what about protecting supply chains? Ideally, every supplier has a robust security program, strong ransomware defense, and stout resilience measures in place. Unfortunately, as we have learned in the face of other threats, this is not the case.

cyolotn pdf Download (649 KB)

Safeguard your organization from risks and vulnerabilities associated with third-party access.

protecht pdf Download (6.08 MB)

This ebook provides a comprehensive view of what true Enterprise Risk Management is and illustrates how it addresses the inherent problems in the traditional, siloed, non-enterprise approach.

CCTNacl default Download

Securing digital supply chains is one of the most critical jobs facing today's cybersecurity teams.

CCTNacl pdf Download (2.81 MB)

ThisToday, Horizon benefits from a risk culture that protects their information assets and recognizes the value of a strong risk program.

CCTNacl default Download

The Grid® represents the democratic voice of real software users, rather than the subjective opinion of one analyst. G2 rates products from the GRC Platforms category algorithmically based on data sourced from product reviews shared by G2 users and data aggregated from online sources and social networks.

Log in

Please Login to download this file

Username *
Password *
Remember Me
Go to top