Security Risk, Strategy & Governance - Blueprints

Build, Optimize, and Present a Risk-Based Security Budget

Security budgets are unlike other department budgets. Increases or decreases in the budget can drastically affect the organizational risk level. Info-Tech’s methodology...
  • guided implementation icon

Develop Your Security Outsourcing Strategy

The need and importance of IT security is growing but most organizations lack the time and resources needed to create a mature security program internally. Most...
  • guided implementation icon

Manage Third-Party Service Security Outsourcing

A lack of time and resources prevent many CISOs and organizations from being able to enable security services and deliver them internally. In addition, there is not...
  • guided implementation icon

Understanding Regulation With Blockchain Technology

Understand the implications of blockchain from a usage and forensic perspective, as well as the potential unique issues of this transformative technology.
  • guided implementation icon

Fast Track Your GDPR Compliance Efforts

The GDPR enforcement deadline is here. Organizations must understand the risk of non-compliance and what the ramifications may mean for their reputation and future...
  • guided implementation icon

Improve Security Governance With a Security Steering Committee

Successful information security governance requires a venue to address security concerns with participation across the entire business. Without access to requisite...
  • guided implementation icon

Develop Necessary Documentation for GDPR Compliance

Understand your GDPR requirements concerning your data protection officer, retention requirements, and privacy and cookie policies. Use this blueprint to customize...

Dive Into Five Years of Security Strategies

Since 2013, Info-Tech’s “Build an Information Security Strategy” research has been used to help our members build their security programs. Using our own Security...

Combine Security Risk Management Components Into One Program

IT departments are tasked with implementing new projects, but are often unsure how to assess the risk. Often, they use informal discussions that do not allow the business...
  • guided implementation icon

Reduce and Manage Your Organization’s Insider Threat Risk

The hard digital wall has crumbled. The focus of organizations has been to protect themselves from the outside, but they equally need to assess and protect themselves...
  • guided implementation icon
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us