Use Info-Tech's CISO Diary to access stakeholder interview questions and to record and summarize your stakeholder interviews.
|
|
Use Info-Tech's Introduction Sheet to create a short communication memo to send to your colleagues on your first day.
|
|
Use Info-Tech's Diagnostic Benchmarks: Security Governance & Management Scorecard to compare your results against your peers.
|
|
Use the Executive Presentation Example as a reference to building out The First 100 Days as CISO Executive Presentation Template.
|
|
Use Info-Tech's Diagnostic Benchmarks: Security Business Satisfaction Report Tool to compare your results against your peers.
|
|
Align your security projects properly by clearly defining business needs, and customer/compliance obligations, as well as documenting scope, boundaries, and risk tolerance.
|
|
Security pressure posture analysis helps your organization assess your real security context and enables you to invest in the right security functions while balancing the...
|
|
Technology sophistication and business adoption, the proliferation of hacking techniques, and the expansion of hacking motivations from financial to social, political, or...
|
|
Without a charter to control and set clear objectives for security, the responsibility of security governance initiatives will likely be undefined within the enterprise,...
|
|
Use this template to present the results of your information security strategy planning to your stakeholders.
|
|