Security - Storyboard

Implement a Security Governance and Management Program – Phases 1-3

This storyboard will help you develop an information security governance and management framework that aligns security objectives with business goals through a mutually...

Implement a Security Governance and Management Program – Phase 1: Align Business Goals With Security Objectives

This phase of the blueprint, Implement a Security Governance and Management Program, will help you align your organization's security objectives with its business goals...

Combine Security Risk Management Components Into One Program – Phases 1-4

This storyboard will help you build a right-sized security risk management program that allows you to have a dynamic approach to triaging, assessing, and presenting risk.

Combine Security Risk Management Components Into One Program – Phase 1: Establish the Risk Environment

This phase of the blueprint will help you define responsibilities and accountabilities within your security risk management program and an organizational risk tolerance level.

Build an Information Security Strategy – Phases 1-4

Technology sophistication and business adoption, the proliferation of hacking techniques, and the expansion of hacking motivations from financial to social, political, or...

Combine Security Risk Management Components Into One Program – Phase 2: Conduct Threat and Risk Assessments

This phase of the blueprint will help you develop a methodology for conducting threat and risk assessments across any project or initiative across the IT department.

Combine Security Risk Management Components Into One Program – Phase 3: Build the Security Risk Register

This phase of the blueprint will help you collect, analyze, and aggregate security risks in order to gain a view into the organizational risk profile.

Combine Security Risk Management Components Into One Program – Phase 4: Communicate the Risk Management Program

This phase of the blueprint will help you report on risk based on the requirements needed within your organization.

Build an Information Security Strategy – Phase 4: Execute and Maintain

This phase of the blueprint, Build an Information Security Strategy, will help you manage and achieve your security targets and assess your progress as the plan evolves.

Build a Data Privacy Program – Phase 2: Conduct a Privacy Gap Analysis

This phase of the blueprint, Build a Data Privacy Program, will help you to understand the current state of privacy, identify the target state, and develop gap-closing...
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us