Self-assessments of the system of internal control should be aligned with the risk assessment process and completed at least annually or upon any major change to the...
|
|
The Data Audit Scorecard identifies the areas in which the health of your data can be modified for improvement. Use this template to see where you fall short so you can...
|
|
This storyboard will help you define your security policy program, develop and implement a new policy suite, and communicate and measure the program for coverage and...
|
|
Organizations face an ever-evolving range of cyberthreats. It is crucial to have a security incident management program to detect, respond, and recover from security...
|
|
Use this template as the one document where your metrics and their definitions live, and update it as needed.
|
|
Read our concise Executive Brief to find out why you should design and implement a vulnerability management program, review Info-Tech’s methodology, and understand the...
|
|
Looking for a vulnerability scanning tool? Use this Request for Proposal (RFP) template to get you started.
|
|
Read this Executive Brief to understand why data classification is an initiative for the entire organization and how this blueprint can help simplify the process.
|
|
This storyboard will help you define and develop your data classification program, from formalizing the program to discovering your data and finally implementing data...
|
|
This phase of the blueprint will help you understand the importance of data classification and aid you in developing a classification scheme that meets your...
|
|