Successful information security governance requires a venue to address security concerns with participation across the entire business. Without access to requisite...
|
|
Read this Executive Brief to understand why a security steering committee is different than an IT steering committee but just as valuable.
|
|
This storyboard will help you set up your steering committee and identify the key players, their responsibilities and the capabilities of your committee.
|
|
This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you define your committee.
|
|
This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you determine how information will flow between the committee and...
|
|
This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you define your meeting agendas and the procedures to support those...
|
|
This Info-Tech briefing will provide a synopsis of what occurred and how organizations can leverage this data breach to expand their security program.
|
|
Use this tool to dynamically document all data that is retained by the organization, how long it will be stored, and other details.
|
|
Use this template to set the foundational requirements of data retention within the organization.
|
|
Use this external-facing template to customize a privacy notice that provides users with a comprehensive understanding of how you process their personal data, why, and...
|
|