|
Use this template as the one document where your metrics and their definitions live, and update it as needed.
|
|
|
Organizations need security programs that are holistic, risk-aware, and business-aligned. Watch this webinar to learn how to create a successful security strategy.
|
|
|
Use the Information Security Pressure Analysis Tool to assess the security risks your organization faces, evaluate stakeholder attitudes to information security, and...
|
|
|
Recovering from a disaster cannot occur without having key people in place to bring system, equipment, and services back online. Use this worksheet to identify team...
|
|
|
This template will help you build a final budget presentation that you can deliver to stakeholders to gain final budgetary approval.
|
|
|
This phase of the blueprint, Build, Optimize, and Present a Risk-Based Security Budget, will help you take your completed budget and communicate the value of security to...
|
|
|
This tool will allow you to build a security budget that maps security controls to the business capabilities they enable, while creating three different budget options that...
|
|
|
This template will help you build a presentation in order to perform “preshopping” with stakeholders. Preshopping is when you speak with stakeholders prior to the final...
|
|
|
Use this tool to help you organize and prioritize your current security governance and management challenges.
|
|
|
Info-Tech has developed an approach to cloud security that is built on the strong foundations of our security strategy model that has been successfully implemented across...
|
|