|
This tool should be used as a current state analysis of your project portfolio practices. Use the results to determine if further assessment is needed.
|
|
|
This tool should be used to conduct the audit of your chosen projects and portfolios.
|
|
|
Use this tool to determine whether your organization should consider SOC 2 or ISO 27001 certification to help manage customer expectations for information security.
|
|
|
Use this tool to help build a business case for obtaining an information security certification such as SOC 2 or ISO 27001.
|
|
|
Use this tool as a starting point to track all types of subject access requests throughout the process.
|
|
|
Identify relevant metrics to assist in evaluating the success of your organization's incident response processes.
|
|
|
Prioritize the order in which the security incident runbooks will be developed based on the frequency and the impact of the potential incidents.
|
|
|
Assign responsibilities and deadlines for incident response and the management process.
|
|
|
This tool should be used as a current state and gap analysis of the services currently provided to your organization. The results will help define the services your new PMO...
|
|
|
Use this tool to help you quickly gauge your organization's current security incident management processes.
|
|