Satisfy Customer Requirements for Information Security – Phases 1-3

This storyboard will help you satisfy customer requirements for information security and determine if SOC 2 or ISO 27001 certification is right for you.

Responsibly Resume IT Operations in the Office – Phases 1-5

As the post-pandemic landscape begins to take shape, ensure that IT can effectively prepare and support your employees as they return to the office.

Time Study Storyboard

Info-Tech Research Group conducted a research project that focused on the time management practices of cybersecurity professionals.

Satisfy Customer Requirements for Information Security – Phase 3: Obtain and Maintain Certification

This phase of the blueprint, Satisfy Customer Requirements for Information Security, will help you determine the scope of your certification, prepare for and pass the...

Satisfy Customer Requirements for Information Security – Phase 2: Select a Certification Path

This phase of the blueprint, Satisfy Customer Requirements for Information Security, will help you understand your options for obtaining a security certification and...

Satisfy Customer Requirements for Information Security – Phase 1: Manage Customer Expectations for Information Security

This phase of the blueprint, Satisfy Customer Requirements for Information Security, will help you understand customer expectations for information security and build a...

Reduce and Manage Your Organization's Insider Threat Risk – Phase 2: Implement an Insider Threat Program

This phase of the blueprint, Reduce and Manage Your Organization's Insider Threat Risk, will help you implement an insider threat program and complete an employee...

Reduce and Manage Your Organization's Insider Threat Risk – Phases 1-2

Understand the variety of threats from malicious, accidental, and negligent insiders. Assess security maturity vis-à-vis insider threat. Formally develop an insider...

Reduce and Manage Your Organization's Insider Threat Risk – Phase 1: Understand What Insider Threats Are and Where They Come From

This phase of the blueprint, Reduce and Manage Your Organization's Insider Threat Risk, will help you understand the threats and controls associated with insider threat.

Responsibly Resume IT Operations in the Office – Phase 2: Repatriate People to the Office

Prepare to return your employees to the office. Ensure that IT takes into account the health and safety of employees while creating an efficient and sustainable working...
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us