Archive for 'Products' Category
infotex Programming Coordinator, Michael Hartke, introduces a high level overview of the upcoming update to the infotex SIEM. Look for more movies in the coming months informing our Clients, and those just now learning about us, about the SIEM and its features and functions.
If you’re in charge of reviewing insurance from an IT perspective, here are three helpful hints… A Jolley | Hadaway Short. Tell your critical vendors you want to have an “endorsement” on their cyber insurance policies. Note: this does not put you ahead of anybody in the “lawsuit line,” That is a myth. But what […]
Quick and Easy ERM Committee Boilerplate! This is a starting point for those wanting to establish an Enterprise Risk Management Committee. (It can also be used as the structure for an ISO Committee Charter, as well as a Audit Committee Charter.) The boilerplate charter is meant to establish the Enterprise Risk Management Committee, its membership, […]
Quick and Easy Due Diligence Checklist! Our most popular tool! What should you look for when you review a SOC2 report? What if you get a SOC1 or SOC3 instead? What type of paper trail should you leave, demonstrating an adequate review? How do you track that all appropriate stakeholders have processed their part of […]
This document is an asset-based drill-down risk assessment that can be used to establish inherent and residual risk on vulnerabilities to ATMs whether they are simply ADA-compliant “dumb ATMs” or the new “smart ATMs.”
These Microsoft PowerPoint slides can be used to walk management team members through the Management Guidelines for Social Media.
The act of customizing this guidance document will help your team determine how you want to managers to appear in social networking situations!
These Microsoft PowerPoint slides can be inserted into your existing User Awareness Training programs to teach users how to protect your organization and themselves in the social networking space.
This is the checklist we use when we audit a bank, to ensure they are properly managing their existing social media sites.
This document provides guidance to social media site developers so that all vulnerabilities exposed in the social media risk assessment process are properly addressed.