The Security Program Design and Implementation Plan will help you collect the results of your security program design efforts. Use this tool in conjunction with the...
|
|
Recovering from a disaster cannot occur without having key people in place to bring system, equipment, and services back online. Use this worksheet to identify team...
|
|
A formalized security organizational structure assigns and defines the security roles and responsibilities of different members in the organization. Clarity of...
|
|
Issuing an RFP to vendors is a critical step in your email security gateway solution selection process.
|
|
Allowing vendors to run a product demonstration without your guidance will only highlight their strengths and present a subjective and skewed view of their product offering.
|
|
Use the Data Audit Interview Schedule to ensure you organize interviews with the proper data audit participants.
|
|
Use this template as the one document where your metrics and their definitions live, and update it as needed.
|
|
Identify and manage key stakeholders to improve your relationships within the organization.
|
|
Once you have completed the CISO Stakeholder Power Map activity, use this tool to create a strategy to cultivate your stakeholder relationships, and manage each...
|
|
Use this template to define a formal charter for your Data Classification Steering Committee by clearly listing goals, expectations, and agenda items.
|
|