Popular Categories
Featured Apps
-
Apps, Powered by ZapierDetectifySKU: detectifyDetectify continuously analyzes your web application from a hacker’s perspective and reports back ...
-
Apps, LegislationRegPlatformSKU: RegPlatformRegPlatform is an AI-enabled regulatory intelligence platform that transforms global regulatory comp ...
-
Apps, FrameworksSalt AdaptiveSKU: Salt AdaptiveProfessional & effective eLearning designed for adult learners.
-
Apps, Risk ManagementVital4 - Criminal Screening (VITAL4CRIM)SKU: Vital4 - Criminal Screening (VITAL4CRIM)Quick & accurate criminal screening with customizable filters & daily reporting.
-
Apps, Database & AnalyticsIT Harvest - Cybersecurity Market ResearchSKU: IT Harvest - Cybersecurity Market Research Dashboard PlatformIT Harvest Dashboard: Unleashing the Power of Cybersecurity Market Research Discover the most com ...
-
Apps, Risk ManagementOrbit Intelligence by Thomas MurraySKU: Orbit Intelligence by Thomas MurrayMaster risk landscape, centralize insights, monitor entities.
Featured Content
-
Content, Audit & Assessment templatesASD Essential 8 Maturity AssessmentSKU: ASD Essential 8 Maturity AssessmentThe Essential Eight Maturity Model, first published in June 2017 and updated regularly, supports the ...
-
Content, StandardsISO 9001:2016 Quality Management Systems (QMS)SKU: ISO 9001:2016 Quality Management Systems (QMS)ISO 9001:2016 Quality Management Systems (QMS) specifies the requirements for a quality management s ...
-
Content, StandardsPayment Card Industry Data Security Standard 3.2.1 (PCI-DSS)SKU: Payment Card Industry Data Security Standard 3.2.1 (PCI-DSS)Global security standard for protecting cardholder data & reducing credit card fraud.
-
Content, Incident PlaybooksNIST SP 800-30 R1: Risk AssessmentsSKU: NIST SP 800-30 r1 guide for Conducting Risk AssessmentsComprehensive risk assessment guidelines to identify and manage potential threats.
-
Content, Powered by 6clicksISO/IEC 27001:2022SKU: ISO/IEC 27001:2022An international information security standard for protecting sensitive data.
-
Content, Audit & Assessment templatesCISA Zero Trust Maturity Model Assessment TemplateSKU: CISA Zero Trust Maturity Model Assessment TemplateCISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization ef ...
Featured Managed Services
-
Services, Managed ServicesAssessTech - ConsultingSKU: AssessTech ConsultingAssessTech is a technology and training company specialising in all aspects of Competence Management ...
-
Services, Managed ServicesTata Consultancy ServicesSKU: Tata Consultancy ServicesTata Consultancy Services is an IT services, consulting and business solutions organization that has ...
-
Services, Managed ServicesIQ Wired - Telecom & Technology Service ManagementSKU: IQ Wired - Telecom & Technology Service ManagementLooking for a reliable and efficient service management company that specializes in telecom and tech ...
-
Services, Professional ServicesCyberCX - Governance, Risk, and Compliance ConsultingSKU: CyberCX Cybersecurity ExpertsExpert GRC consulting services from CyberCX to help businesses mitigate risk and comply with regulat ...
-
Services, Managed ServicesKWM - Banking & FinanceSKU: KWM - Banking & Finance
From navigating and shaping regulatory change to developing innovative finance solutions for soph ...
-
Services, Managed ServicesBusiness Continuity by RiskLogicSKU: Business Continuity by RiskLogicBoost resilience, save time and money with our business continuity plans.