For more information and guidance on penetration testing or packages IT Governance offers, please contact our experts who will be able to discuss your organizations needs further.
Download a range of different resources, such as guides, datasheets, and green papers, providing technical guidance to help support your penetration testing program.
Most organizations are the target of random, indiscriminate attacks, and they need an appropriate level of penetration testing to ensure their defences are adequate. This free green paper provides a clear introduction to best-practice penetration testing.
Article 32 of the EU GDPR (General Data Protection Regulation) requires organizations to implement technical measures to ensure data security. This green paper offers practical guidance on how to conduct a penetration test that supports GDPR compliance.
Penetration testing is an essential component of any ISO 27001 ISMS (information security management system). This free green paper describes how penetration testing fits into an ISO 27001 ISMS project.
Our penetration testing experts share practical insights about implementing a penetration testing program. Designed to inform information security professionals, this webinar will help you to conduct effective, value-for-money penetration testing as part of a technical security assurance framework.
This webinar covers best practices for penetration testing and vulnerability assessments, and how to train staff as part of creating a strong information security system that addresses people, processes, and technology.
Although many organizations are familiar with the concept of penetration testing, they often struggle to understand how to fit it into their overall GDPR compliance project, or even how to get started. It is vital that organizations properly ascertain vulnerabilities and test and apply patches. In this webinar, IT Governance will provide an overview of how penetration testing can effectively support organizations in achieving GDPR compliance.
Learn how IT Governance approaches a penetration test and how our penetration testing services can strengthen your security posture.
This infographic provides a quick guide to ransomware – what it is, how it works, what happens when your system is infected and what you can do to stop it.
To do our part in spreading cyber security awareness, we’ve created an infographic covering phishing attacks and what users can do to protect themselves against this common online threat.