Security Risk, Strategy & Governance

Mature Your Privacy Operations – Phases 1-6

Use this storyboard to guide your privacy program maturation. This project should be started after the completion of Build a Data Privacy Program.

Data Protection Impact Assessment Tool

To enable effective execution of compliance to the GDPR, a Data Protection Impact Assessment should be completed for processing activities that put data subjects at risk.

Mature Your Privacy Operations – Executive Brief

Use the Executive Brief of this storyboard to guide your privacy program maturation. This project should be completed after Build a Data Privacy Program.

Privacy Metrics Determination and Tracking Tool

This tool will help you determine your privacy program goals and develop KPIs to measure your progress on those goals.

Privacy Readiness Assessment Tool

Use this tool to determine your privacy program's maturity and to identify any initiatives needed to close gaps and boost maturity in assessed areas.

Security Awareness Month Materials

October is Security Awareness Month and we’ve built four decks for you to share. Use these decks to remind your end users of security best practices.

Enterprise Threat Preparedness Workbook

Use the Enterprise Threat Preparedness Workbook to document your preparedness for each of the various attack tactics and techniques that an attacker may use. Choose the...

Threat Preparedness Using MITRE ATT&CK®

Info-Tech has developed an approach to prioritizing the threat areas that are most pressing to your enterprise. Using the MITRE ATT&CK framework, identify the impact of and...
  • guided implementation icon

Threat Preparedness Using MITRE ATT&CK® – Executive Brief

Read our concise Executive Brief to find out why threat preparedness is a crucial first step in defending your network against any attack type. Review Info-Tech’s...

Threat Preparedness Using MITRE ATT&CK® – Phase 1: Attack Tactics and Techniques

This phase of the blueprint Threat Preparedness Using MITRE ATT&CK® will help you understand all of the attack tactics and techniques that a malicious attacker may use to...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us