A formalized security organizational structure assigns and defines the security roles and responsibilities of different members in the organization. Clarity of...
|
|
Use this template as the one document where your metrics and their definitions live, and update it as needed.
|
|
Use this storyboard to develop an information security governance and management model and implement essential governance processes.
|
|
Use this storyboard to build or update a business-aligned, risk-aware, and holistic information security strategy that prioritizes program initiatives for the next three...
|
|
Use this tool to identify which competencies are most important to your organization, and what your current proficiency is in each competency.
|
|
Identify and manage key stakeholders to improve your relationships within the organization.
|
|
Once you have completed the CISO Stakeholder Power Map activity, use this tool to create a strategy to cultivate your stakeholder relationships, and manage each...
|
|
Security budgets are unlike other department budgets. Increases or decreases in the budget can drastically affect the organizational risk level. Info-Tech’s methodology...
|
|
Read this Executive Brief to understand why a human-centric security program is needed to raise your security culture and prevent end users from being your largest...
|
|
This storyboard will help you develop a security awareness and training program, which includes building a formal awareness and training program to elevate the security...
|
|