Use this blueprint to hire or develop a world-class CISO with the competencies that suit your specific organizational needs. Once you have identified the right candidate,...
|
|
Use this tool to map business and IT initiatives to specific security mitigation controls. This tool is a documentation and mapping support tool as part of your larger...
|
|
Use this tool to allow you to determine your organization's specific appropriateness for having a security awareness and training program.
|
|
This tool will help you build a security metrics program.
|
|
This tool helps an organization identify the major benefits and drivers for adopting a zero trust security strategy.
|
|
Use this template to develop a comprehensive user-facing acceptable use policy to formalize various aspects of security that are relevant to your end users.
|
|
Eliminate the security risks of Shellshock quickly. A brief research note for Info-Tech’s members.
|
|
Use the results of the assessments from Phase 1 to build a three-year roadmap for improving the security program as a whole.
|
|
The key deliverable in the Data Privacy Program blueprint, the Data Privacy Framework takes into account the current state of privacy and provides you with the steps to...
|
|
Perform a legitimate interest assessment when legitimate interest is used as the lawful basis for business processes under GDPR.
|
|