This is one of eight security awareness and training templates that can be used to educate end users on best practices. This presentation focuses on passwords.
|
|
This template will help you build a presentation in order to perform “preshopping” with stakeholders. Preshopping is when you speak with stakeholders prior to the final...
|
|
This template will help you build a final budget presentation that you can deliver to stakeholders to gain final budgetary approval.
|
|
Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.
|
|
Info-Tech has developed a portfolio of inject examples that members can leverage to get started and build upon in order to implement their own tabletop exercise capability.
|
|
Ensure you are getting the level of service you expect.
|
|
Ensure secure operations of information processing with regards to implementation of an external third party.
|
|
Make sure you that your desire to outsource matches your organization's security mandate.
|
|
This template offers a summary report of a risk management program, including an overview of the program and major risks.
|
|
As a data controller or processor, align your required record of processing requirements to your activities.
|
|