Security Risk, Strategy & Governance - Storyboard
Topics
Types of Content
Satisfy Customer Requirements for Information Security – Phase 3: Obtain and Maintain CertificationThis phase of the blueprint, Satisfy Customer Requirements for Information Security, will help you determine the scope of your certification, prepare for and pass the... |
|
Comply With the California Consumer Privacy Act StoryboardThis storyboard will help you tackle CCPA compliance. |
|
Comply With the California Consumer Privacy Act – Phase 1: Create a Subject Access Request (SAR) ProcessThis phase of the blueprint, Comply with the California Consumer Privacy Act, will help you create a subject access request process. |
|
Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan – Phases 1-3This storyboard will help you to take a proactive approach to identifying the needed technical skills for your future environment and to systematically decide how to... |
|
Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan – Phase 1: Identity Skill Needs for Target StateThis phase of the blueprint will help you define your security initiative skill needs. |
|
Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan – Phase 2: Identify Technical Skill GapsThis phase of the blueprint will help you align role requirements with future initiative skill needs. |
|
Close the InfoSec Skills Gap: Develop a Skills Sourcing Plan for Future Work Roles – Phase 3: Develop a Sourcing Plan for Future Work RolesThis phase of the blueprint will help you decide how to acquire skills. |
|
Reduce and Manage Your Organization's Insider Threat Risk – Phases 1-2Understand the variety of threats from malicious, accidental, and negligent insiders. Assess security maturity vis-à-vis insider threat. Formally develop an insider... |
|
Reduce and Manage Your Organization's Insider Threat Risk – Phase 1: Understand What Insider Threats Are and Where They Come FromThis phase of the blueprint, Reduce and Manage Your Organization's Insider Threat Risk, will help you understand the threats and controls associated with insider threat. |
|
Reduce and Manage Your Organization's Insider Threat Risk – Phase 2: Implement an Insider Threat ProgramThis phase of the blueprint, Reduce and Manage Your Organization's Insider Threat Risk, will help you implement an insider threat program and complete an employee... |
|