This template will help you organize your various security communication efforts with different stakeholders.
|
|
Communication between security and the rest of the business can be difficult because the two parties often speak different languages. Your security messages should be...
|
|
Use this tool to map business and IT initiatives to specific security mitigation controls. This tool is a documentation and mapping support tool as part of your larger...
|
|
Use this template to define a specific process for managing information security incidents to minimize their impact on the organization.
|
|
Use this template as the one document where your metrics and their definitions live, and update it as needed.
|
|
Use this tool to allow you to determine your organization's specific appropriateness for having a security awareness and training program.
|
|
This tool will help to identify content that should be covered by your security awareness and training program.
|
|
Lenovo’s strategy to pre-install the Superfish application on some consumer devices was fundamentally irresponsible and a squander of customers’ trust.
|
|
The Data Source Inventory Tool will help you document relevant information pertaining to each data source to act as a point of reference document.
|
|
Data owners, data stewards, and end users are the ones who use the data on a day-to-day basis and will be able to provide the best information regarding ongoing data...
|
|