This phase of the blueprint, Develop a Security Awareness and Training Program That Empowers End Users, will help you determine what training methods to use with end...
|
|
Read this Executive Brief to understand how to build a risk-based budget and what requirements you need for a defensible security budget.
|
|
This storyboard will help you build a security budget that adapts to risks and threats, while also taking into account your business model, making it easier to...
|
|
A formalized security organizational structure assigns and defines the security roles and responsibilities of different members in the organization. Clarity of...
|
|
This phase of the blueprint, Build, Optimize, and Present a Risk-Based Security Budget, will help you take your completed budget and communicate the value of security to...
|
|
This is a brief research note for Info-Tech’s members about the Heartbleed bug, i.e. the first security vulnerability with worldwide impact and response. Understand which...
|
|
This template will help you build a presentation in order to perform “preshopping” with stakeholders. Preshopping is when you speak with stakeholders prior to the final...
|
|
This tool will allow you to build a security budget that maps security controls to the business capabilities they enable, while creating three different budget options...
|
|
This template will help you build a final budget presentation that you can deliver to stakeholders to gain final budgetary approval.
|
|
Security pressure posture analysis helps your organization assess your real security context and enables you to invest in the right security functions while balancing the...
|
|