Security Governance Organizational Structure

A formalized security organizational structure assigns and defines the security roles and responsibilities of different members in the organization. Clarity of...

Security Metrics Summary Document

Use this template as the one document where your metrics and their definitions live, and update it as needed.

Establish Effective Security Governance & Management – Phases 1-2

Use this storyboard to develop an information security governance and management model and implement essential governance processes.

Build an Information Security Strategy – Phases 1-4

Use this storyboard to build or update a business-aligned, risk-aware, and holistic information security strategy that prioritizes program initiatives for the next three...

CISO Core Competency Evaluation Tool

Use this tool to identify which competencies are most important to your organization, and what your current proficiency is in each competency.

CISO Stakeholder Power Map Template

Identify and manage key stakeholders to improve your relationships within the organization.

CISO Stakeholder Management Strategy Template

Once you have completed the CISO Stakeholder Power Map activity, use this tool to create a strategy to cultivate your stakeholder relationships, and manage each...

Build, Optimize, and Present a Risk-Based Security Budget

Security budgets are unlike other department budgets. Increases or decreases in the budget can drastically affect the organizational risk level. Info-Tech’s methodology...
  • guided implementation icon

Develop a Security Awareness and Training Program That Empowers End Users – Executive Brief

Read this Executive Brief to understand why a human-centric security program is needed to raise your security culture and prevent end users from being your largest...

Develop a Security Awareness and Training Program That Empowers End Users – Phases 1-2

This storyboard will help you develop a security awareness and training program, which includes building a formal awareness and training program to elevate the security...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us