|
This template, part of the Identify the Components of Your Cloud Security Architecture blueprint, will serve as a repository of information about your approach to securing...
|
|
|
Your first 100 days are the ultimate predictor of your long-term success. Make it count by following Info-Tech's five-step approach.
|
|
|
Traditionally, IT security was typified by perimeter security, like you would see in a castle and moat, where if you could get through the front gates, you were trusted to...
|
|
|
Use the Executive Presentation Example as a reference to building out The First 100 Days as CISO Executive Presentation Template.
|
|
|
Use Info-Tech's Diagnostic Benchmarks: Security Governance & Management Scorecard to compare your results against your peers.
|
|
|
Use Info-Tech's Introduction Sheet to create a short communication memo to send to your colleagues on your first day.
|
|
|
Use Info-Tech's Key Stakeholder Engagement Plan to access stakeholder interview questions and to record and summarize your stakeholder interviews.
|
|
|
Your first 100 days are the ultimate predictor of your long-term success. Make it count by following Info-Tech's five-step approach.
|
|
|
Read this Executive Brief to understand Info-Tech's five-step approach to conquering your first 100 days as a CISO.
|
|
|
Use this checklist to ensure that you are implementing all of the IT security best practices when you are working from home or away from the office.
|
|