Info-Tech recently conducted several surveys for our research projects. This document is a high level summary of those results and an introduction to the resulting research.
|
|
Use this catalog template to create a formal list of information security services offered and service level agreements.
|
|
This template is designed to introduce consistency and outline key requirements during the request for proposal (RFP) phase of selecting an MSSP.
|
|
Businesses continue to benefit by offering shared access data centers to partners, suppliers, and clients. The issue in this method of organization is ensuring that each...
|
|
Use this e Information Security Charter to define the scope and purpose of your security program.
|
|
Cyberattackers target your end users, who remain today’s weakest link in organizational security. Design and deliver an effective and up-to-date training program to...
|
|
Use this tool to build a roadmap to help you reach your target state.
|
|
Use this template to define a specific process for managing information security incidents to minimize their impact on the organization.
|
|
Use this tool to build your target state information security governance and management framework and conduct a gap analysis.
|
|
This Info-Tech briefing will provide a synopsis of what the Shadow Brokers leak might mean for users and organizations, and what actions can be taken in response to this...
|
|