Use Info-Tech's Diagnostic Benchmarks: Security Governance & Management Scorecard to compare your results against your peers.
|
|
Use Info-Tech's Introduction Sheet to create a short communication memo to send to your colleagues on your first day.
|
|
Use Info-Tech's CISO Diary to access stakeholder interview questions and to record and summarize your stakeholder interviews.
|
|
Your first 100 days are the ultimate predictor of your long-term success. Make it count by following Info-Tech's five-step approach.
|
|
Read this Executive Brief to understand Info-Tech's five-step approach to conquering your first 100 days as a CISO.
|
|
Organizations need security programs that are holistic, risk-aware, and business-aligned. Watch this webinar to learn how to create a successful security strategy.
|
|
From employee management through leadership and communication, increased cyber threats, logistics and operations to post-pandemic planning and risk mitigation, the threat...
|
|
Info-Tech's Data Protection Policy template is for internal use and ensures that data privacy best practices are supported and enforced within the organization.
|
|
To future-proof your security program, you need to understand and plan for emerging threats and trends. In this webinar we will introduce you to the future of...
|
|
IT must quickly identify the must-dos to allow a safe return to the office. During this webinar we will go through how to build a prioritized roadmap for safe reopening...
|
|