Recommended Key Initiative Plan
These 9 initiatives have been found to elicit the most significant measurable impact for professionals in this role.
- .
Security Risk, Strategy & Governance
Featured Blueprints

January 31, 2019
The cybersecurity skills gap is an ever-growing challenge that all organizations will eventually face. To circumvent the problem, actively plan for...

December 18, 2018
Since 2013, Info-Tech’s “Build an Information Security Strategy” research has been used to help our members build their security programs. Using ou...

November 23, 2018
Successful information security governance requires a venue to address security concerns with participation across the entire business. Without acc...

October 09, 2018
When assessing your information security program against an industry framework, don’t reinvent the wheel; use the tools in this blueprint to align ...

August 14, 2018
The GDPR enforcement deadline is here. Organizations must understand the risk of non-compliance and what the ramifications may mean for their reput...

July 24, 2018
Understand the implications of blockchain from a usage and forensic perspective, as well as the potential unique issues of this transformative tech...

July 10, 2018
Organizations require an effective security architecture in order to connect security to the business. This blueprint demonstrates Info-Tech’s appr...

June 12, 2018
The sensitivity of data varies significantly, from public information to highly confidential trade secrets. To ensure proper protection, businesses...
Resources
Security Technology & Operations
Featured Blueprints

December 07, 2018
Risks from third parties are on the rise, but many organizations still struggle with how to tackle this problem. A risk-based approach is needed to...

August 31, 2018
Many organizations do not have an incident response plan, and those that do often forget to include a communications plan, leading to time loss whi...

August 31, 2018
This research will lay the groundwork for establishing a centralized, effective, and efficient system for managing identity and access. We will hel...

July 24, 2018
Understand the implications of blockchain from a usage and forensic perspective, as well as the potential unique issues of this transformative tech...

March 05, 2018
Move away from framework-driven security programs and build one that is based on the unique risk profile of the organization. Develop a security ri...

January 25, 2018
The use of a tabletop exercise is an excellent way to test the effectiveness of an organization’s overall security program, the investment of techn...

December 18, 2017
The need and importance of IT security is growing but most organizations lack the time and resources needed to create a mature security program int...

December 12, 2017
Current security practices are disjointed, operating independently with a wide variety of processes and tools to conduct incident response, network...