Information Security Steering Committee Stakeholder Presentation

Use this template to explain the goals and benefits of the Information Security Steering Committee.

Improve Security Governance With a Security Steering Committee – Phase 3: Operate the Information Security Steering Committee

This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you define your meeting agendas and the procedures to support those...

Master Your Security Incident Response Communications Program – Phase 2: Develop Your Communications Plan

This phase of the blueprint, Master Your Security Incident Response Communications Program, will help you to develop strategies for both internal and external communications.

Security Incident Communications Guidelines and Templates

Use these guidelines and templates to help draft your organization's communications plan.

Identify Opportunities to Mature the Security Architecture

Organizations require an effective security architecture in order to connect security to the business. This blueprint demonstrates Info-Tech’s approach to evaluating the...
  • guided implementation icon

Security Incident Communications Policy Template

Use this policy template to help define your organization's procedures and expectations surrounding incident response communications.

Identify Opportunities to Mature the Security Architecture – Phase 1: Identify the Organization's Ideal Security Architecture

Complete multiple assessments to determine how mature the security architecture should be for your organization. These assessments will look at IT complexity, security...

Security Incident Response Interdepartmental Communications Template

Use this template to facilitate communication between the various departments that make up the Security Incident Response Team.

Security Architecture Recommendation Tool

This tool guides organizations in evaluating the complexity of their IT environment, their operational maturity, and the perceived value of security architecture. It then...

Identify Opportunities to Mature the Security Architecture – Phase 2: Create a Security Program Roadmap

Use the results of the assessments from Phase 1 to build a three-year roadmap for improving the security program as a whole.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us