Dive Into Five Years of Security Strategies

Since 2013, Info-Tech’s “Build an Information Security Strategy” research has been used to help our members build their security programs. Using our own Security...

Improve Security Governance With a Security Steering Committee

Successful information security governance requires a venue to address security concerns with participation across the entire business. Without access to requisite...
  • guided implementation icon

Align Your Security Controls to Industry Frameworks for Compliance

When assessing your information security program against an industry framework, don’t reinvent the wheel; use the tools in this blueprint to align your current assessment...

Fast Track Your GDPR Compliance Efforts

The GDPR enforcement deadline is here. Organizations must understand the risk of non-compliance and what the ramifications may mean for their reputation and future...
  • guided implementation icon

Security Management Playbook

Security leaders spend most of their leadership role in firefighter mode, neglecting other aspects of their jobs that will elevate them to a trusted business partner and...

Manage Third-Party Service Security Outsourcing

A lack of time and resources prevent many CISOs and organizations from being able to enable security services and deliver them internally. In addition, there is not...
  • guided implementation icon

Develop Your Security Outsourcing Strategy

The need and importance of IT security is growing but most organizations lack the time and resources needed to create a mature security program internally. Most...
  • guided implementation icon

Build, Optimize, and Present a Risk-Based Security Budget

Security budgets are unlike other department budgets. Increases or decreases in the budget can drastically affect the organizational risk level. Info-Tech’s methodology...
  • guided implementation icon

Humanize the Security Awareness and Training Program

Cyberattackers target your end users, who remain today’s weakest link in organizational security. Design and deliver an effective and up-to-date training program to...
  • guided implementation icon

Embed Security Architecture Into All Things IT

Assess your security needs, define security architecture principles, and define security reference architecture.
GET HELP Contact Us
×
VL Methodology