Security Risk, Strategy & Governance

Example Data Flow Diagram – e-Commerce

Use this example as a starting point to documenting your data flow diagrams.

Webinar: Create a Business-Aligned Information Security Strategy

Organizations need security programs that are holistic, risk-aware, and business-aligned. Watch this webinar to learn how to create a successful security strategy.

Diagnostic Benchmarks: Security Business Satisfaction Report

Use Info-Tech's Diagnostic Benchmarks: Security Business Satisfaction Report Tool to compare your results against your peers.

The First 100 Days as CISO Executive Presentation Template

Use Info-Tech's Executive Presentation Template to present your diagnostic report findings and next steps.

Cyber Insurance Policy Comparison Tool

This tool will help you to score your prospective insurance policies based on their relative coverage and exclusions.

Build a Cloud Security Strategy – Phase 2: Prioritize Initiatives and Construct a Roadmap

This phase of the blueprint Build an Cloud Security Strategy will help you prioritize and roadmap action items to better secure the cloud.

Data Security Matrix

Break down, assess, compare compliance frameworks, and identify gaps in the organization's data security landscape using the Data Security Matrix tool.

Data Security Technical Report

Effective data security involves many moving parts, and will require support from a number of key individuals within the organization. The Data Security Technical Report...

Security Compliance Process Template

Use this template to help document your information security compliance management program.

Security Compliance Management Tool

Use this tool to track your security compliance management framework and program.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us