Security - Storyboard

Responsibly Resume IT Operations in the Office – Phase 1: Evaluate Your New Risk Tolerance

Identify the new risk landscape and risk tolerance for your organization in a post-pandemic world. Determine how this may impact the second wave of pandemic transition tasks.

Responsibly Resume IT Operations in the Office – Phase 2: Repatriate People to the Office

Prepare to return your employees to the office. Ensure that IT takes into account the health and safety of employees while creating an efficient and sustainable working...

Responsibly Resume IT Operations in the Office – Phase 3: Repatriate Assets to the Office

Prepare the organization's assets for return to the office. Ensure that IT takes into account the off-license purchases and new additions to the hardware family that took...

Responsibly Resume IT Operations in the Office – Phase 4: Repatriate Workloads to the Office

Prepare and position IT to support workloads in order to streamline office reintegration. This may include leveraging pre-existing solutions in different ways and...

Responsibly Resume IT Operations in the Office – Phase 5: Prioritize Your Tasks and Build the Roadmap

Once you've identified IT's supporting tasks, it's time to prioritize. This phase walks through the activity of prioritizing based on cost/effort, alignment to business,...

Restart the Engine of Your Project Portfolio

Restarting the engine of the project portfolio mid-pandemic won’t be as simple as turning a key and hitting the gas. Use this concise research to find the right path...

Build a Data Privacy Program – Phase 4: Implement and Operationalize

This phase of the blueprint, Build a Data Privacy Program, will help you to make the program functional and operational, through the use and implementation of customized...

Design a Coordinated Vulnerability Disclosure Program – Phases 1-2

This storyboard will help you develop a methodology for receiving vulnerability reports from external parties.

Design a Coordinated Vulnerability Disclosure Program – Phase 1: Assess Goals

This phase of the blueprint, Assess Goals, will help you identify business requirements, customer expectations, and compliance obligations for the coordinated...

Design a Coordinated Vulnerability Disclosure Program – Phase 2: Formalize the Program

This phase of the blueprint, Formalize the Program, will help you create a coordinated vulnerability disclosure policy and plan.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us