Use Info-Tech's Introduction Sheet to create a short communication memo to send to your colleagues on your first day.
|
|
Use Info-Tech's CISO Diary to access stakeholder interview questions and to record and summarize your stakeholder interviews.
|
|
Use this checklist to ensure that you are implementing all of the IT security best practices when you are working from home or away from the office.
|
|
Use this template to manage your information security compliance requirements.
|
|
This tool will help you plan out a training schedule for the different end-user groups and the topics that need to be delivered.
|
|
This template will help you organize your various security communication efforts with different stakeholders.
|
|
The Security Program Design and Implementation Plan will help you collect the results of your security program design efforts. Use this tool in conjunction with the...
|
|
Ensure secure operations of information processing with regards to implementation of an external third party.
|
|
This template will help you build a final budget presentation that you can deliver to stakeholders to gain final budgetary approval.
|
|
Make sure you that your desire to outsource matches your organization's security mandate.
|
|