Revive Your Risk Management Program with a Regular Health Check – Phases 1-3

You’ve identified the most important IT risks and implemented projects to protect IT and the business, but your risk assessment is now out of date. Perform regular health...

Revive Your Risk Management Program with a Regular Health Check – Phase 1: Refine IT Risk Management Governance

Use this phase to perform a retrospective of your IT risk management program and create an improvement plan.

Revive Your Risk Management Program with a Regular Health Check – Phase 2: Reassess IT Risk Events and Identify New Threats

Use this phase to re-assess previously identified risk events and identify new threats.

Revive Your Risk Management Program with a Regular Health Check – Phase 3: Develop Risk Responses and Communicate Priorities to the Business

Use this phase to establish monitoring responsibilities, develop risk responses, and communicate your risk priorities to the business.

Establish an Effective IT Steering Committee – Phases 1-4

Leverage Info-Tech’s process and deliverables to see dramatic improvements in your business satisfaction by effectively establishing an IT steering committee.

Establish an Effective IT Steering Committee – Phase 1: Build the Steering Committee Charter

This phase of the blueprint, Establish an Effective IT Steering Committee, will help you build your IT steering committee charter.

Establish an Effective IT Steering Committee – Phase 2: Define ITSC Processes

This phase of the blueprint, Establish an Effective IT Steering Committee, will help you build high-level IT steering committee processes.

Establish an Effective IT Steering Committee – Phase 3: Build the Stakeholder Presentation

This phase of the blueprint, Establish an Effective IT Steering Committee, will help you build a presentation for the steering committee's stakeholders.

Establish an Effective IT Steering Committee – Phase 4: Define the Prioritization Criteria

This phase of the blueprint, Establish an Effective IT Steering Committee, will help you build a project intake and prioritization process.

Comply with the Security Requirements of HIPAA or SOX – Phases 1-3

This storyboard will walk you through the management of security compliance in regards to HIPAA and SOX. It will define gaps, and create an actionable roadmap to assist...
GET HELP Contact Us
×
VL Methodology