Improve Security Governance With a Security Steering Committee – Executive Brief

Read this Executive Brief to understand why a security steering committee is different than an IT steering committee but just as valuable.

Improve Security Governance With a Security Steering Committee – Phases 1-3

This storyboard will help you set up your steering committee and identify the key players, their responsibilities and the capabilities of your committee.

Improve Security Governance With a Security Steering Committee – Phase 1: Define Committee Purpose and Responsibilities

This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you define your committee.

Improve Security Governance With a Security Steering Committee – Phase 2: Determine Information Flows, Membership & Accountabilities

This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you determine how information will flow between the committee and...

Improve Security Governance With a Security Steering Committee – Phase 3: Operate the Information Security Steering Committee

This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you define your meeting agendas and the procedures to support those...

Information Security Steering Committee Stakeholder Presentation

Use this template to explain the goals and benefits of the Information Security Steering Committee.

KnowBe4 Expands Into Brazil With the Purchase of El Pescador From Tempest

KnowBe4, a leader in end-user security training, has acquired El Pescador, a Brazilian security awareness and training company. This could be a good fit if you are...

2019 Cybersecurity Excellence Awards for Security Education Organizations

The Cybersecurity Excellence Awards of 2019 have been announced. While these awards help to identify leaders in this market, we recommend using other factors to decide...

Security Lessons From Recent Citrix Data Breach

According to Citrix and Resecurity, attackers exploited weak passwords and bypassed multi-factor authentication to obtain Citrix’s business documents.

KnowBe4 Begins the Federal Risk and Authorization Management Program (FedRAMP) Authorization Process

KnowBe4, a leader in end-user security training, has begun the authorization process for the Federal Risk and Authorization Management Program (FedRAMP). This is yet...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us