Security Risk, Strategy & Governance - Storyboard

Hire or Develop a World-Class CISO – Phases 1-4

Use this blueprint to hire or develop a world-class CISO with the competencies that suit your specific organizational needs. Once you have identified the right candidate,...

Establish Effective Security Governance & Management – Phases 1-2

Use this storyboard to develop an information security governance and management model and implement essential governance processes.

Build an Information Security Strategy – Phases 1-4

Use this storyboard to build or update a business-aligned, risk-aware, and holistic information security strategy that prioritizes program initiatives for the next three...

Discover and Classify Your Data – Phases 1-3

This storyboard will help you define and develop your data classification program, from formalizing the program to discovering your data and finally implementing data...

Discover and Classify Your Data – Phase 1: Formalize the Classification Program

This phase of the blueprint will help you understand the importance of data classification and aid you in developing a classification scheme that meets your...

Discover and Classify Your Data – Phase 2: Discover the Data

This phase of the blueprint will help you perform and manage data discovery.

Discover and Classify Your Data – Phase 3: Classify the Data

This phase of the blueprint will help you assign proper classifications to your data and track meaningful metrics to continually improve the program.

Develop a Security Awareness and Training Program That Empowers End Users – Phases 1-2

This storyboard will help you develop a security awareness and training program, which includes building a formal awareness and training program to elevate the security...

Develop a Security Awareness and Training Program That Empowers End Users – Phase 1: Develop Your Training Program

This phase of the blueprint, Develop a Security Awareness and Training Program That Empowers End Users, will help you build a development plan for your program, as well...

Develop a Security Awareness and Training Program That Empowers End Users – Phase 2: Design an Effective Training Delivery Plan

This phase of the blueprint, Develop a Security Awareness and Training Program That Empowers End Users, will help you determine what training methods to use with end...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us