Resources

Cybersecurity white papers, data sheets, webinars, videos and more

Resource Library

Clear filters

Managed Services for Supply Chain Detection and Response Buyer’s Guide

November 6, 2025

Managed Services for Supply Chain Detection and Response Buyer’s Guide
Supply Chain Cyber Risk
Third-Party Risk Management
Threat-Informed TPRM
Securing the Supply Chain: Building Cyber Resilience in the Modern Era

May 28, 2025

Securing the Supply Chain: Building Cyber Resilience in the Modern Era
Supply Chain Cyber Risk
Third-Party Risk Management
Threat-Informed TPRM
The Definitive Guide to Building a Supply Chain Incident Response Team

April 30, 2025

The Definitive Guide to Building a Supply Chain Incident Response Team
Supply Chain Cyber Risk
Third-Party Risk Management
Threat-Informed TPRM
Buyer’s Guide: Supply Chain Detection and Response for Financial Services

November 25, 2024

Buyer’s Guide: Supply Chain Detection and Response for Financial Services
Financial Services
Third-Party Risk Management
Threat-Informed TPRM
Buyer’s Guide: Supply Chain Detection and Response for Healthcare

November 25, 2024

Buyer’s Guide: Supply Chain Detection and Response for Healthcare
Healthcare
Third-Party Risk Management
Threat-Informed TPRM
Buyer’s Guide: Supply Chain Detection and Response

November 22, 2024

Buyer’s Guide: Supply Chain Detection and Response
Third-Party Risk Management
Threat-Informed TPRM
Managed Services for Supply Chain Detection and Response Buyer’s Guide

October 7, 2024

Managed Services for Supply Chain Detection and Response Buyer’s Guide
jerry.leon@chanzuckerberg.com… Read More
Supply Chain Cyber Risk
Third-Party Risk Management
Threat-Informed TPRM
Why the FAIR Model Can Be So Unfair

June 26, 2024

Why the FAIR Model Can Be So Unfair
サードパーティ リスク マネジメント プログラム 構築完全ガイド

January 14, 2024

サードパーティ リスク マネジメント プログラム 構築完全ガイド
How Continuous Underwriting is Transforming Cyber Insurance

January 14, 2024

How Continuous Underwriting is Transforming Cyber Insurance
Cyber Insurance
Compliance Officer Action Plan

January 12, 2024

Compliance Officer Action Plan
Evolve from Risk Management to Risk Intelligence

January 12, 2024

Evolve from Risk Management to Risk Intelligence
5 Tips To Know You Are Using Data You Can Trust

January 12, 2024

5 Tips To Know You Are Using Data You Can Trust
Boards are from Mars, CISOs are from Venus

January 12, 2024

Boards are from Mars, CISOs are from Venus
4 Factors To Consider When Evaluating A Cybersecurity Partner

January 12, 2024

4 Factors To Consider When Evaluating A Cybersecurity Partner
The Perfect Scorecard: Getting an A in Cybersecurity from your Board of Directors

January 12, 2024

The Perfect Scorecard: Getting an A in Cybersecurity from your Board of Directors
5 Steps You Can Take To Boost Your Boards Involvement And Stay Compliant

January 11, 2024

5 Steps You Can Take To Boost Your Boards Involvement And Stay Compliant
5 Steps to Avoid Cyber Incident

January 11, 2024

5 Steps to Avoid Cyber Incident
Cyber Insurance
DORA: A Journey To Cyber Resilience

January 11, 2024

DORA: A Journey To Cyber Resilience
DORA
5 Ways To Secure Your Organization In Turbulent Times

January 11, 2024

5 Ways To Secure Your Organization In Turbulent Times
C-Suite Liability and Cybersecurity: Strategies for Navigating a New Era of Enforcement

December 13, 2023

C-Suite Liability and Cybersecurity: Strategies for Navigating a New Era of Enforcement