Develop a Security Awareness and Training Program That Empowers End Users – Phase 1: Develop Your Training Program

This phase of the blueprint, Develop a Security Awareness and Training Program That Empowers End Users, will help you build a development plan for your program, as well...

Develop a Security Awareness and Training Program That Empowers End Users – Phases 1-2

This storyboard will help you develop a security awareness and training program, which includes building a formal awareness and training program to elevate the security...

Develop a Security Awareness and Training Program That Empowers End Users – Executive Brief

Read this Executive Brief to understand why a human-centric security program is needed to raise your security culture and prevent end users from being your largest...

Security Governance and Management Challenge Analysis Tool

Use this tool to help you organize and prioritize your current security governance and management challenges.

Build, Optimize, and Present a Risk-Based Security Budget

Security budgets are unlike other department budgets. Increases or decreases in the budget can drastically affect the organizational risk level. Info-Tech’s methodology...
  • guided implementation icon

Build an Information Security Strategy – Phases 1-4

Technology sophistication and business adoption, the proliferation of hacking techniques, and the expansion of hacking motivations from financial to social, political, or...

Implement a Security Governance and Management Program – Phases 1-3

This storyboard will help you develop an information security governance and management framework that aligns security objectives with business goals through a mutually...

Implement a Security Governance and Management Program – Phase 1: Align Business Goals With Security Objectives

This phase of the blueprint, Implement a Security Governance and Management Program, will help you align your organization's security objectives with its business goals...

Security Metrics Summary Document

Use this template as the one document where your metrics and their definitions live, and update it as needed.

CISO Core Competency Evaluation Tool

Use this tool to identify which competencies are most important to your organization, and what your current proficiency is in each competency.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us