Time Study

Info-Tech Research Group conducted a research project that focused on the time management practices of cybersecurity professionals. The report was based on the responses...

Time Study Storyboard

Info-Tech Research Group conducted a research project that focused on the time management practices of cybersecurity professionals.

Threat Landscape Briefing – November 2019

This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals, hacktivists campaigns, data breaches, control strategies,...

Security Policy Review – Concierge Experience

Info-Tech’s Concierge Experiences are a powerful set of advisory services that we deliver to you, our members, leveraging the best practices that we research. These...

Darktrace Masters the Art of Storytelling With Cyber AI Analyst

Darktrace introduced a “Cyber AI Analyst” in September 2019 as a means of offloading incident management responsibilities from InfoSec practitioners. This new feature...

Privacy Regulation Roundup

This Privacy Regulation Roundup summarizes the latest major global privacy regulatory development, announcements, and changes. This report is updated on a monthly basis.

Develop a Security Awareness and Training Program That Empowers End Users – Phase 2: Design an Effective Training Delivery Plan

This phase of the blueprint, Develop a Security Awareness and Training Program That Empowers End Users, will help you determine what training methods to use with end...

Security Awareness and Training Program Development Tool

This tool will help you identify initiatives to develop your security awareness and training program. The tool focuses on four areas of initiatives: the fundamentals,...

Security Awareness and Training Metrics Tool

This tool will help you identify and select metrics for measuring the success of your security awareness and training program.

Security Training Campaign Development Tool

This tool will help you identify user groups within your organization and determine what the risk profile is of each group. It will help you prioritize security training...
GET HELP Contact Us
×
VL Methodology