To enable an effective security program, all areas of security need to be evaluated closely to determine where the organization sits currently and where it needs to go to...
|
|
Info-Tech's Data Protection Policy template is for internal use and ensures that data privacy best practices are supported and enforced within the organization.
|
|
This tool helps an organization identify the major benefits and drivers for adopting a zero trust security strategy.
|
|
A charter is the organizational mandate that outlines the purpose, scope, and authority of the Information Security Steering Committee.
|
|
The GDPR enforcement deadline is here. Organizations must understand the risk of non-compliance and what the ramifications may mean for their reputation and future...
|
|
Once you have assessed your competency, process, and technology gaps, use this tool to set goals and create an action plan to remediate any gaps.
|
|
Use this blueprint to hire or develop a world-class CISO with the competencies that suit your specific organizational needs. Once you have identified the right candidate,...
|
|
Your CISO must be integrated with the business in order to be successful. If your CISO is stuck guarding the perimeter rather than enabling business processes, this...
|
|
Use this tool to map business and IT initiatives to specific security mitigation controls. This tool is a documentation and mapping support tool as part of your larger...
|
|
Use this assessment to identify which metrics best align with your organization's risk tolerance level and other requirements.
|
|