Build, Optimize, and Present a Risk-Based Security Budget

Security budgets are unlike other department budgets. Increases or decreases in the budget can drastically affect the organizational risk level. Info-Tech’s methodology...
  • guided implementation icon

Develop a Security Awareness and Training Program That Empowers End Users – Executive Brief

Read this Executive Brief to understand why a human-centric security program is needed to raise your security culture and prevent end users from being your largest...

Develop a Security Awareness and Training Program That Empowers End Users – Phases 1-2

This storyboard will help you develop a security awareness and training program, which includes building a formal awareness and training program to elevate the security...

Develop a Security Awareness and Training Program That Empowers End Users – Phase 1: Develop Your Training Program

This phase of the blueprint, Develop a Security Awareness and Training Program That Empowers End Users, will help you build a development plan for your program, as well as...

Security Governance Organizational Structure

A formalized security organizational structure assigns and defines the security roles and responsibilities of different members in the organization. Clarity of...

Develop a Security Awareness and Training Program That Empowers End Users – Phase 2: Design an Effective Training Delivery Plan

This phase of the blueprint, Develop a Security Awareness and Training Program That Empowers End Users, will help you determine what training methods to use with end users...

Build an Information Security Strategy – Phases 1-4

Use this storyboard to build or update a business-aligned, risk-aware, and holistic information security strategy that prioritizes program initiatives for the next three...

Build, Optimize, and Present a Risk-Based Security Budget – Phases 1-3

This storyboard will help you build a security budget that adapts to risks and threats, while also taking into account your business model, making it easier to communicate...

Security Governance and Management Challenge Analysis Tool

Use this tool to help you organize and prioritize your current security governance and management challenges.

Information Security Pressure Analysis Tool

Use the Information Security Pressure Analysis Tool to assess the security risks your organization faces, evaluate stakeholder attitudes to information security, and...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us