Security - Blueprints

Build, Optimize, and Present a Risk-Based Security Budget

Security budgets are unlike other department budgets. Increases or decreases in the budget can drastically affect the organizational risk level. Info-Tech’s methodology...
  • guided implementation icon

Assess and Manage Security Risks

A mature security risk management practice is a critical component of a comprehensive and risk-aware information security program. Use this blueprint to effectively...
  • guided implementation icon

Develop a Security Operations Strategy

Current security practices are disjointed, operating independently with a wide variety of processes and tools to conduct incident response, network defense, and threat...

Design a Tabletop Exercise to Support Your Security Operation

The use of a tabletop exercise is an excellent way to test the effectiveness of an organization’s overall security program, the investment of technology controls, and the...
  • guided implementation icon

Identify Opportunities to Mature the Security Architecture

Organizations require an effective security architecture in order to connect security to the business. This blueprint demonstrates Info-Tech’s approach to evaluating the...
  • guided implementation icon

Master Your Security Incident Response Communications Program

Many organizations do not have an incident response plan, and those that do often forget to include a communications plan, leading to time loss while trying to create one...
  • guided implementation icon

Improve Security Governance With a Security Steering Committee

Successful information security governance requires a venue to address security concerns with participation across the entire business. Without access to requisite...
  • guided implementation icon

Build a Vendor Security Assessment Service

Risks from third parties are on the rise, but many organizations still struggle with how to tackle this problem. A risk-based approach is needed to manage supply chain...
  • guided implementation icon

Develop Necessary Documentation for GDPR Compliance

Understand your GDPR requirements concerning your data protection officer, retention requirements, and privacy and cookie policies. Use this blueprint to customize...

Embed Security Into the DevOps Pipeline

Transcend traditional application security approaches and embrace the agile mindset to shift security left. Use innovation and automation to secure the DevOps pipeline...
  • guided implementation icon
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us