Office of the CIO Template

This template is to support the planning of an organization structure for the office of the CIO.

Microsoft’s Ignite Announcements Take Direct Aim at the Competition

Microsoft’s Ignite conference speaks to enterprise developers and IT teams, and this year’s event is making waves with a slew of new product announcements aimed squarely at...

The Risk of Underinvesting in Project Risk

Economically, the only way to justify spending on project risk mitigation is to invest at least enough to understand the worst risks that need to be avoided. To make sense...

Information Security Requirements Gathering Tool for K-12

Use this tool to identify goals and compliance obligations and make explicit links to how security initiatives propose to support these interests. Then define the scope for...

Prioritize AI Use Cases for Education

AI is rapidly entering the education space, and CIOs need to be prepared to take advantage of its potential benefits. An AI use case library for education is designed to...

BCP Recovery Playbook for Higher Education

Recovery playbook helps you document processes and additional details to support BCP.

Develop a Business Continuity Plan for Higher Education – Phases 1-4

This blueprint will help you streamline your business continuity plan process within the higher education industry by following our four-phase methodology.

Develop a Business Continuity Plan for Higher Education

Implement a structured and repeatable process, applied to one business unit at a time. Keep BCP planning efforts manageable and enable business unit leads to own their BCP...
  • guided implementation icon

Build an Information Security Strategy for K-12 Schools – Phases 1-4

Use this storyboard to augment your security strategy by ensuring alignment with business objectives, assessing your organization's risk and stakeholder expectations,...

Build an Information Security Strategy for K-12 Schools

Many K-12 schools and districts do not have sufficient resources to adequately address information security needs. Having a well-defined information security plan that is...
  • guided implementation icon
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us