Build a Service-Based Security Resourcing Plan – Phases 1-3

Author(s): Logan Rohde, Isabelle Hertanto

1 Download

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

This blueprint will give you a step-by-step process to :

  • Formalize the roles of your security team
  • Build a security service portfolio
  • Estimate hours to complete each service
  • Determine expected and discretionary demand for each service
  • Review current resourcing status
  • Plan to meet future resourcing challenges.

At the end of this project you will have an up-to-date service portfolio and a three-year security resourcing plan, based on FTE hours required to meet service demand.

View the Complete Blueprint:

Build a Service-Based Security Resourcing Plan

Every security program is unique; resourcing allocations should reflect this.

Related Content

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019