Use this template as the one document where your metrics and their definitions live, and update it as needed.
|
|
Identify and manage key stakeholders to improve your relationships within the organization.
|
|
Once you have completed the CISO Stakeholder Power Map activity, use this tool to create a strategy to cultivate your stakeholder relationships, and manage each...
|
|
Use this template to define a formal charter for your Data Classification Steering Committee by clearly listing goals, expectations, and agenda items.
|
|
Use this template to thoroughly outline details of the data classification program, including classification levels, data handling requirements, and disclaimers.
|
|
Formalizing a risk management program requires creating repeatable and iterative processes, and documenting best practices. Create a comprehensive manual to serve as the...
|
|
Integrate IT risk management with business risk management by creating a paper trail for key risks.
|
|
Create a succinct, impactful document that summarizes the outcomes from the risk assessment and highlights the IT risk council’s top recommendations to the senior...
|
|
This training program manual will allow you to document key information and provides an overview of your new training program.
|
|
This template provides example survey questions to ask an organization’s end users to assess their current level of understanding of security topics and organizational...
|
|