Recommended Key Initiative Plan
These 9 initiatives have been found to elicit the most significant measurable impact for professionals in this role.
- .
Security Risk, Strategy & Governance
Featured Blueprints

December 16, 2020
Mastering a cost-effective approach to cybersecurity and data protection compliance can provide organizations with a clear strategic advantage. Tak...

November 06, 2020
What’s the key to a data security plan that keeps breaches at bay? A multi-layered approach that covers all the bases and data sources. Comprehensi...

November 05, 2020
This blueprint will help you rise to the challenge of a cost-optimization mandate by helping you assess how well your people, process, and technolo...

November 04, 2020
Design an AI implementation that is guided by data governance and data privacy best practices. Effective AI implementation is built on a foundation...

October 23, 2020
This research is designed to help organizations who are preparing for a merger or acquisition and need help with understanding the information secu...

October 06, 2020
Info-Tech has developed an approach to cloud security that is built on the strong foundations of our security strategy model that has been successf...

October 01, 2020
Traditionally, IT security was typified by perimeter security, like you would see in a castle and moat, where if you could get through the front ga...

September 23, 2020
This blueprint will help you to prioritize the threats you need insurance coverage for, how much coverage is necessary for your organization, and w...
Resources
Security Technology & Operations
Featured Blueprints

November 05, 2020
Weak identity and access management practices result in considerable risk to the organization because it plays a role in most things in IT. Info-Te...

October 06, 2020
Info-Tech has developed an approach to cloud security that is built on the strong foundations of our security strategy model that has been successf...

September 18, 2020
Many security leaders put off adding metrics to their program because they don't know where to start or how to assess what is worth measuring.

August 10, 2020
Businesses prioritize speed to market over secure coding and testing practices in the development lifecycle. As a result, vulnerabilities exist nat...

March 30, 2020
The recent events around COVID-19 have been unprecedented, and organizations have taken measures to maintain business continuity. Security can nev...

March 20, 2020
With the COVID-19 pandemic forcing many businesses to start operating remotely, security is often the first to suffer. Start a training program for...

March 12, 2020
Use this blueprint to establish your security operations program with a threat collaboration environment.

February 13, 2020
Organizations don’t always integrate their incident response and disaster recovery plans, which creates gaps in their response strategy to ransomwa...