CISO Diary

Use Info-Tech's CISO Diary to access stakeholder interview questions and to record and summarize your stakeholder interviews.

Introduction Sheet

Use Info-Tech's Introduction Sheet to create a short communication memo to send to your colleagues on your first day.

Diagnostic Benchmarks: Security Governance & Management Scorecard

Use Info-Tech's Diagnostic Benchmarks: Security Governance & Management Scorecard to compare your results against your peers.

The First 100 Days as CISO Executive Presentation Example

Use the Executive Presentation Example as a reference to building out The First 100 Days as CISO Executive Presentation Template.

Diagnostic Benchmarks: Security Business Satisfaction Report

Use Info-Tech's Diagnostic Benchmarks: Security Business Satisfaction Report Tool to compare your results against your peers.

Information Security Requirements Gathering Tool

Align your security projects properly by clearly defining business needs, and customer/compliance obligations, as well as documenting scope, boundaries, and risk tolerance.

Information Security Pressure Analysis Tool

Security pressure posture analysis helps your organization assess your real security context and enables you to invest in the right security functions while balancing the...

Build an Information Security Strategy – Phases 1-4

Technology sophistication and business adoption, the proliferation of hacking techniques, and the expansion of hacking motivations from financial to social, political, or...

Information Security Charter

Without a charter to control and set clear objectives for security, the responsibility of security governance initiatives will likely be undefined within the enterprise,...

Information Security Strategy Communication Deck

Use this template to present the results of your information security strategy planning to your stakeholders.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us