Use this tool to formally identify business goals, customer and compliance obligations, and make explicit links to how security initiatives propose to support these business interests.

Then define the scope and boundaries for the security strategy, and the risk tolerance definitions that will guide future security risk decisions.

Use this tool in conjunction with the project blueprint, Build an Information Security Strategy.

Also In

Design a Coordinated Vulnerability Disclosure Program

Because it's likely tomorrow’s law.

Also In

Develop and Implement a Security Incident Management Program

Create a scalable incident response program without breaking the bank.

Also In

Build an Information Security Strategy

Create value by aligning your strategy to business goals and business risks.

Also In

Develop a Security Operations Strategy

Transition from a security operations center to a threat collaboration environment.

Related Content


Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019