Use this template as the one document where your metrics and their definitions live, and update it as needed.
|
|
Organizations face an ever-evolving range of cyberthreats. It is crucial to have a security incident management program to detect, respond, and recover from security...
|
|
Lenovo’s strategy to pre-install the Superfish application on some consumer devices was fundamentally irresponsible and a squander of customers’ trust.
|
|
A 20-person IT department in a mid-sized regional grocery retailer received a mandate from its Board of Directors to reapproach and increase its risk management...
|
|
This template is designed to provide EPP vendors with a consistent set of instructions, ensuring an objective comparison of product features, all while evaluating ease of...
|
|
This is a brief research note for Info-Tech’s members about the Heartbleed bug, i.e. the first security vulnerability with worldwide impact and response. Understand which...
|
|
The In-House vs. Outsourcing Decision-Making Tool is designed to help organizations analyze the cost and risk management effectiveness for security capabilities with...
|
|
An Asian-headquartered chemical manufacturing organization with an 80-year history and facilities in over 20 countries wants to assess IT risks for its operations in the...
|
|
Info-Tech's Security Policy templates allow you to easily develop new policy documents.
|
|
Use Info-Tech's Maintenance Policy to define how system maintenance procedures will operate.
|
|