Security Risk, Strategy & Governance
Topics
Types of Content
Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan – Phases 1-3This storyboard will help you to take a proactive approach to identifying the needed technical skills for your future environment and to systematically decide how to... |
|
Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan – Phase 1: Identity Skill Needs for Target StateThis phase of the blueprint will help you define your security initiative skill needs. |
|
Security Initiative Skills GuideUse this template to document future initiatives skill needs. |
|
Technical Skills WorkbookUse this tool to evaluate the impact of different characteristics of skill needs and to decide how to acquire the skills. |
|
Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan – Phase 2: Identify Technical Skill GapsThis phase of the blueprint will help you align role requirements with future initiative skill needs. |
|
Skills Gap Prioritization ToolUse this tool to prioritize future security initiative skill needs. |
|
Current Workforce Skills AssessmentUse this tool to assess your current workforce against their work role skill requirements. |
|
Close the InfoSec Skills Gap: Develop a Skills Sourcing Plan for Future Work Roles – Phase 3: Develop a Sourcing Plan for Future Work RolesThis phase of the blueprint will help you decide how to acquire skills. |
|
Quest Software’s Toad for Oracle SDP Addresses Data Privacy Compliance ChallengesQuest Software’s new add-on module, Toad for Oracle Standard Data Protection (SDP), automates the detection and remediation of potential violations of data privacy... |
|
Varonis Report Identifies Widespread Shortcomings of Organizational Data Security Despite Increased Pressure of RegulationsVaronis reports that even after GDPR, businesses still are failing to effectively protect sensitive data. |
|