This phase of the blueprint will help you develop a methodology for conducting threat and risk assessments across any project or initiative across the IT department.
|
|
Use this tool to track your security compliance management framework and program.
|
|
Use this template to help document your information security compliance management program.
|
|
Mergers and acquisitions are challenging for many IT leaders in small enterprises. Use Info-Tech’s resources to assist with appropriate due diligence and prepare for...
|
|
An IT leader in a growing municipality needs to take a proactive approach to security and build out its policies. Info-Tech’s blueprints and templates save them time and...
|
|
This phase of the blueprint will help you report on risk based on the requirements needed within your organization.
|
|
This phase of the blueprint will help you collect, analyze, and aggregate security risks in order to gain a view into the organizational risk profile.
|
|
This storyboard will help you build a right-sized security risk management program that allows you to have a dynamic approach to triaging, assessing, and presenting risk.
|
|
Understand your GDPR requirements concerning your data protection officer, retention requirements, and privacy and cookie policies. Use this blueprint to customize...
|
|
Read this Executive Brief to understand why a highly mature security risk management program can help inform your overall security program.
|
|