Information Security Strategy Workbook Template


Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

Clearly identifying and documenting your information security obligations, scope, goals, and other pertinent information are essential parts of building and implementing a holistic and effective information security program. At the same time, streamlining the high-level information security responsibilities across the enterprise will ensure the security department gets buy-in and support from senior management and business units at the beginning.

Use this tool to help you document:

  • The business requirements, regulatory requirements, and contractual requirements your security program needs to meet.
  • The scope and boundary of your security program.
  • High-level responsibilities.

This document will help you track your development of the security strategy as you move through this project.

2 Comments

  • 4f773d2cad5c29eda60ec49424d1d0eb comment
    CJ Brunner | 08-24-2017

    Tool has a typo! Run Spell check.

    • 432c05244a845caaca3b276adb15a11e comment
      Info-Tech Research Group | 08-24-2017

      Thank you for bringing this to our attention. The typo has been fixed.

Related Content

GET HELP Contact Us
×
VL Methodology