Recommended Key Initiative Plan
These 9 initiatives have been found to elicit the most significant measurable impact for professionals in this role.
- .
Security Risk, Strategy & Governance
Featured Blueprints

December 11, 2019
Privacy is now considered an integral part of information security. In fact, consumers often want more than a company’s word that their data is sec...

December 06, 2019
Info-Tech Research Group conducted a research project that focused on the time management practices of cybersecurity professionals. The report was ...

November 27, 2019
Cyberattackers target your end users, who remain today’s weakest link in organizational security. Design and deliver an effective and up-to-date tr...

September 27, 2019
Your customers and potential customers are increasingly demanding assurance that you will meet their information security requirements. Discover be...

September 18, 2019
This project covers the major commonalities of GDPR and CCPA.

July 17, 2019
The cybersecurity skills gap is an ever-growing challenge that all organizations will eventually face. To circumvent the problem, actively plan for...

June 24, 2019
The hard digital wall has crumbled. The focus of organizations has been to protect themselves from the outside, but they equally need to assess and...

May 23, 2019
Security programs tend to focus on technology to protect organizations while often neglecting the people, processes, and policies needed to govern ...
Resources
Security Technology & Operations
Featured Blueprints

September 09, 2019
Security incidents are inevitable, but how they’re dealt with can make or break an organization. Poor incident response negatively affects business...

July 11, 2019
This blueprint will comprehensively evaluate your hosted cloud risk profile to determine what unique security controls your organization requires t...

July 09, 2019
Board-level presentations are a rare opportunity for security and business to understand each other’s viewpoints and the things they care about, an...

May 30, 2019
Traditional legacy anti-virus solutions are unable to keep up with the sheer volume of new and sophisticated endpoint attacks. As a potential solut...

March 04, 2019
Transcend traditional application security approaches and embrace the agile mindset to shift security left. Use innovation and automation to secure...

December 07, 2018
Risks from third parties are on the rise, but many organizations still struggle with how to tackle this problem. A risk-based approach is needed to...

August 31, 2018
Many organizations do not have an incident response plan, and those that do often forget to include a communications plan, leading to time loss whi...

August 31, 2018
This research will lay the groundwork for establishing a centralized, effective, and efficient system for managing identity and access. We will hel...