Security Risk, Strategy & Governance

Security Pressure Posture Analysis Tool

Security pressure posture analysis helps your organization assess your real security context and enables your organization to invest in the right security functions while...

Risk Register Tool

This is a dynamic tool that captures identified risks, assesses their severity based on your organization's risk appetite, and documents risk response actions. Use this...

Information Security Program Gap Analysis Tool

To enable an effective security program, all areas of security need to be evaluated closely to determine where the organization sits currently and where it needs to go to...

Cut PCI Compliance and Audit Costs in Half

If you are a merchant, chances are you still need to be PCI compliant or you are in the middle of the process. It doesn’t have to be overwhelming or costly. Choose the...
  • guided implementation icon

PCI Simplification Capture Tool

This capture tool allows organizations to record where they are currently in terms of PCI compliance, to enable summary compliance reporting, as well as analysis of the...

Security Compliance Translator Tool

This tool will allow you to review the security compliance requirements of HIPAA and SOX, and identify where there are existing gaps.

Fast Track Your GDPR Compliance Efforts

The GDPR enforcement deadline is here. Organizations must understand the risk of non-compliance and what the ramifications may mean for their reputation and future...
  • guided implementation icon

Data Protection Policy

Info-Tech's Data Protection Policy template is for internal use and ensures that data privacy best practices are supported and enforced within the organization.

Security Governance Organizational Structure Template

This document provides exemplar organizational structure templates, as well as a RACI chart to help the CISO delegate responsibility for initiatives and tasks.

Information Security Awareness and Training Appropriateness Tool

Use this tool to allow you to determine your organization's specific appropriateness for having a security awareness and training program.
GET HELP Contact Us
×
VL Methodology