Implement a Security Governance and Management Program – Phases 1-3

This storyboard will help you develop an information security governance and management framework that aligns security objectives with business goals through a mutually...

Implement a Security Governance and Management Program – Phase 1: Align Business Goals With Security Objectives

This phase of the blueprint, Implement a Security Governance and Management Program, will help you align your organization's security objectives with its business goals...

Implement a Security Governance and Management Program – Phase 2: Develop an Effective Governance Framework

This phase of the blueprint, Implement a Security Governance and Management Program, will help you develop your governance framework.

Implement a Security Governance and Management Program – Phase 3: Manage Your Governance Framework

This phase of the blueprint, Implement a Security Governance and Management Program, will help you implement metrics and audit programs to ensure the continued success...

Security Governance Organizational Structure Template

This document provides exemplar organizational structure templates, as well as a RACI chart to help the CISO delegate responsibility for initiatives and tasks.

Be More Secure Without Passwords: Microsoft Embraces Passwordless Authentication and FIDO2

Microsoft is working to usher in the era of passwordless multi-factor authentication as passwordless API becomes an official W3C standard. Strong authentication using...

ISACA and InfoSec Institute Produce Whitepaper on Using Marketing Techniques and Metrics for Improved Security Awareness Programs

ISACA has partnered with InfoSec Institute to produce a whitepaper on leveraging marketing techniques and metrics to improve security awareness. This is a valuable...

KnowBe4 Begins the Federal Risk and Authorization Management Program (FedRAMP) Authorization Process

KnowBe4, a leader in end-user security training, has begun the authorization process for the Federal Risk and Authorization Management Program (FedRAMP). This is yet...

Security Lessons From Recent Citrix Data Breach

According to Citrix and Resecurity, attackers exploited weak passwords and bypassed multi-factor authentication to obtain Citrix’s business documents.

2019 Cybersecurity Excellence Awards for Security Education Organizations

The Cybersecurity Excellence Awards of 2019 have been announced. While these awards help to identify leaders in this market, we recommend using other factors to decide...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us