Use this tool to identify which competencies are most important to your organization, and what your current proficiency is in each competency.
|
|
Identify and manage key stakeholders to improve your relationships within the organization.
|
|
Once you have completed the CISO Stakeholder Power Map activity, use this tool to create a strategy to cultivate your stakeholder relationships, and manage each...
|
|
Read our concise Executive Brief to find out why you should design and implement a vulnerability management program, review Info-Tech’s methodology, and understand the...
|
|
Looking for a vulnerability scanning tool? Use this Request for Proposal (RFP) template to get you started.
|
|
Read this Executive Brief to understand why data classification is an initiative for the entire organization and how this blueprint can help simplify the process.
|
|
This storyboard will help you define and develop your data classification program, from formalizing the program to discovering your data and finally implementing data...
|
|
This phase of the blueprint will help you understand the importance of data classification and aid you in developing a classification scheme that meets your...
|
|
Use this template to define a formal charter for your Data Classification Steering Committee by clearly listing goals, expectations, and agenda items.
|
|
Use this template to thoroughly outline details of the data classification program, including classification levels, data handling requirements, and disclaimers.
|
|