Avoid the PIA Trap, Integrate PbD Early in Your AppDev Process

Accelerate your application’s GDPR compliance with data protection by design.

Are Regulations and Compliance Better With Cloud?

The migration to external services has pushed regulation and compliance to the forefront of discussions. Are we as an organization at a greater risk in moving to external...

Firewall Policy

Use this policy template to define and support your organization's firewall operations management.

IT Triage and Support Policy

Use this policy template to define and support triage and support operations.

Software Asset Management Policy

Use this policy template to define and support your organization's software asset management program.

Level 2 Project Charter Template

Use this template to create a project charter for medium-sized, moderate-risk projects.

10 Days of Policies

Manage your IT processes and procedures effectively by leveraging Info-Tech’s research on IT policy management and implementation. Each of these ten policy pieces...

Blowing up the status quo: Brexit will impact IT in the UK and beyond

The Brexit vote says Leave. UK-based IT leaders must start to plan for a potentially new era of trans-border data flow and the availability of IT staff. Those in the rest...

Revive Your Risk Management Program with a Regular Health Check – Phase 3: Develop Risk Responses and Communicate Priorities to the Business

Use this phase to establish monitoring responsibilities, develop risk responses, and communicate your risk priorities to the business.

IT Risk Management Executive Brief Template

A sample presentation for communicating the success of the IT risk management program, obtaining investment for IT risk projects, and maintaining executive sponsorship.
GET HELP Contact Us
×
VL Methodology