Build Your Security Operations Program From the Ground Up – Phase 3: Design Your Target State

This phase of the blueprint, Build Your Security Operations From the Ground Up, will help you design a target state and improve your governance and policy solutions.

Security Operations Project Charter Template

Management buy-in is key to establishing an effective next-generation security operations program. The approval indicates that security is top-of-mind and that the...

Develop a Security Awareness and Training Program That Empowers End Users – Executive Brief

Read this Executive Brief to understand why a human-centric security program is needed to raise your security culture and prevent end users from being your largest...

Develop a Security Awareness and Training Program That Empowers End Users – Phases 1-2

This storyboard will help you develop a security awareness and training program, which includes building a formal awareness and training program to elevate the security...

Develop a Security Awareness and Training Program That Empowers End Users – Phase 1: Develop Your Training Program

This phase of the blueprint, Develop a Security Awareness and Training Program That Empowers End Users, will help you build a development plan for your program, as well...

End-User Security Knowledge Test Template

This template provides example survey questions to ask an organization’s end users to assess their current level of understanding of security topics and organizational...

Security Awareness and Training Feedback Template

This template will provide you with example survey questions to ask an organization’s end users in order to collect feedback on security training.

Develop a Security Awareness and Training Program That Empowers End Users – Phase 2: Design an Effective Training Delivery Plan

This phase of the blueprint, Develop a Security Awareness and Training Program That Empowers End Users, will help you determine what training methods to use with end...

Training Materials – Passwords

This is one of eight security awareness and training templates that can be used to educate end users on best practices. This presentation focuses on passwords.

Threat and Risk Assessment Tool

Use this tool to assess the threat and risk severity with any particular IT project or initiative.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us