This phase of the blueprint, Develop a Security Awareness and Training Program That Empowers End Users, will help you determine what training methods to use with end...
|
|
This phase of the blueprint, Develop a Security Awareness and Training Program That Empowers End Users, will help you build a development plan for your program, as well...
|
|
This storyboard will help you develop a security awareness and training program, which includes building a formal awareness and training program to elevate the security...
|
|
Read this Executive Brief to understand why a human-centric security program is needed to raise your security culture and prevent end users from being your largest...
|
|
Security budgets are unlike other department budgets. Increases or decreases in the budget can drastically affect the organizational risk level. Info-Tech’s methodology...
|
|
Once you have completed the CISO Stakeholder Power Map activity, use this tool to create a strategy to cultivate your stakeholder relationships, and manage each...
|
|
This is a brief research note for Info-Tech’s members about the Heartbleed bug, i.e. the first security vulnerability with worldwide impact and response. Understand which...
|
|
Lenovo’s strategy to pre-install the Superfish application on some consumer devices was fundamentally irresponsible and a squander of customers’ trust.
|
|
Use this template as the one document where your metrics and their definitions live, and update it as needed.
|
|
Recovering from a disaster cannot occur without having key people in place to bring system, equipment, and services back online. Use this worksheet to identify team...
|
|