Security Technology & Operations

Internal Controls Self-Assessment Checklist

Self-assessments of the system of internal control should be aligned with the risk assessment process and completed at least annually or upon any major change to the...

Data Audit Scorecard

The Data Audit Scorecard identifies the areas in which the health of your data can be modified for improvement. Use this template to see where you fall short so you can...

Develop and Deploy Security Policies – Phases 1-4

This storyboard will help you define your security policy program, develop and implement a new policy suite, and communicate and measure the program for coverage and...

Develop and Implement a Security Incident Management Program – Phases 1-3

Organizations face an ever-evolving range of cyberthreats. It is crucial to have a security incident management program to detect, respond, and recover from security...

Security Metrics Summary Document

Use this template as the one document where your metrics and their definitions live, and update it as needed.

Implement Risk-Based Vulnerability Management – Executive Brief

Read our concise Executive Brief to find out why you should design and implement a vulnerability management program, review Info-Tech’s methodology, and understand the...

Vulnerability Scanning Tool RFP Template

Looking for a vulnerability scanning tool? Use this Request for Proposal (RFP) template to get you started.

Discover and Classify Your Data – Executive Brief

Read this Executive Brief to understand why data classification is an initiative for the entire organization and how this blueprint can help simplify the process.

Discover and Classify Your Data – Phases 1-3

This storyboard will help you define and develop your data classification program, from formalizing the program to discovering your data and finally implementing data...

Discover and Classify Your Data – Phase 1: Formalize the Classification Program

This phase of the blueprint will help you understand the importance of data classification and aid you in developing a classification scheme that meets your...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us