The Security Program Design and Implementation Plan will help you collect the results of your security program design efforts. Use this tool in conjunction with the...
|
|
The sophistication of cyberattacks coupled with the advancement of new technologies has resulted in a threat landscape that’s been viewed as the most challenging within...
|
|
This report provides insights on the most important security priorities for 2024 and recommendations on implementing initiatives to support the priorities.
|
|
Recovering from a disaster cannot occur without having key people in place to bring system, equipment, and services back online. Use this worksheet to identify team...
|
|
Use this tool to help you organize and prioritize your current security governance and management challenges.
|
|
A formalized security organizational structure assigns and defines the security roles and responsibilities of different members in the organization. Clarity of...
|
|
This is a brief research note for Info-Tech’s members about the Heartbleed bug, i.e. the first security vulnerability with worldwide impact and response. Understand which...
|
|
Lenovo’s strategy to pre-install the Superfish application on some consumer devices was fundamentally irresponsible and a squander of customers’ trust.
|
|
Use this template as the one document where your metrics and their definitions live, and update it as needed.
|
|
Use this storyboard to develop an information security governance and management model and implement essential governance processes.
|
|