Resources

Filters

White Paper

Effective CISO Board Presentations

For years, CISOs have often struggled with gaining access to their Board of Directors. This white paper outlines the top five principles for navigating discussions at this level to garner support and address business needs.

  • Cyber Risk Advisory

White Paper

Standing Up a Privacy Program: A User’s Guide

This white paper dives into collection strategies for inventorying data and the design process and considerations when trying to reduce exposure to unwanted regulatory scrutiny, loss of customer trust, loss of potential business opportunities, and negative press coverage.

  • Cyber Risk Advisory

Webinar

Don't Hesitate...Automate! FedRAMP® Made Easier

This webinar explores ways to simplify and accelerate the FedRAMP process through compliance automation techniques. FedRAMP authorization is the key to Cloud Service Providers (CSPs) accessing the enormous Federal market, tapping into new revenue streams, and transforming a strong cybersecurity posture into a powerful market differentiator.

  • Compliance
  • FedRAMP®

Data Sheet

Threat and Vulnerability Management

When defending your organization’s network and systems against vulnerabilities, knowing where to start is critical. Coalfire’s threat and vulnerability management (TVM) program provides you with a programmatic approach to effectively identify, secure, manage, and communicate your security posture.

  • Cybersecurity

Webinar

Your Secure Cloud: Planning for Success

This webinar features of panel comprising some of the industry’s top cloud experts, who discuss their real-world experience and the latest market research to help you navigate your secure cloud deployment—from strategy through to optimization.

  • Cloud

White Paper

Application Security Year-Over-Year

This is a brief walkthrough of app-specific highlights from our 3rd Annual Penetration Risk Report, that shows how application security matters appear throughout our datasets.

  • Application security

Data Sheet

Internet of Things Product Security

The number of connected devices has skyrocketed in the past few years thanks to modern technology. Because of IoT’s rapid evolution, innovative disruptions are occurring at a staggering pace, especially in the industrial IoT (IIoT) and smart infrastructure, consumer IoT, and medical IoT (IoMT) spaces.

  • Application security