Security - Storyboard

Assess Your Cybersecurity Insurance Policy – Phases 1-3

This blueprint will help you to prioritize the threats you need insurance coverage for, how much coverage is necessary for your organization, and which of your...

The First 100 Days as CISO – Phases 1-5

Your first 100 days are the ultimate predictor of your long-term success. Make it count by following Info-Tech's five-step approach.

Build a Security Metrics Program to Drive Maturity – Phases 1-2

This blueprint will help you set SMART goals and metrics to measure your progress, as well as develop reporting strategies for various metric types.

Build a Security Metrics Program to Drive Maturity – Phase 1: Link Security Metrics to Goals to Boost Maturity

This phase of the blueprint, Build a Security Metrics Program to Drive Maturity, will help you set SMART goals and metrics to measure your progress.

Build a Security Metrics Program to Drive Maturity – Phase 2: Adapt Your Reporting Strategy for Various Metric Types

This phase of the blueprint, Build a Security Metrics Program to Drive Maturity, will help you create a reporting strategy for various types of metrics.

Build an Information Security Strategy – Phases 1-4

Technology sophistication and business adoption, the proliferation of hacking techniques, and the expansion of hacking motivations from financial to social, political, or...

Build an Information Security Strategy – Phase 1: Assess Requirements

This phase of the blueprint, Build an Information Security Strategy, will help you bring your security program into alignment with the organization.

Build an Information Security Strategy – Phase 2: Assess Gaps

This phase of the blueprint, Build an Information Security Strategy, will help you define the initiatives that will achieve your security targets across the board.

Build an Information Security Strategy – Phase 3: Build the Roadmap

This phase of the blueprint, Build an Information Security Strategy, will help you prioritize your security initiatives into an actionable roadmap with your highest...

Build an Information Security Strategy – Phase 4: Execute and Maintain

This phase of the blueprint, Build an Information Security Strategy, will help you manage and achieve your security targets and assess your progress as the plan evolves.
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP Contact Us
×
VL Methodology