Security
Security Research Center
A holistic approach to building an agile, robust security program.
Explore the Security Research CenterBuild an Information Security Strategy for Small Enterprises
Blueprint: Small Enterprise Resources
Build a business-aligned, risk-aware, holistic security strategy that is suited for your small enterprise: gather business requirements to prioritize improvements; assess risks, stakeholder expectations, and risk appetite to set meaningful targets; conduct a comprehensive gap analysis to...
Small enterprises need a security strategy just like any other sized enterprise.
Build a business-aligned, risk-aware, holistic security strategy that is suited for your small enterprise: gather business requirements to prioritize improvements; assess risks, stakeholder expectations, and risk appetite to set meaningful targets; conduct a comprehensive gap analysis to identify improvements; and build a flexible roadmap to set the program on the right footing.
Build an Information Security Strategy
Blueprint: Security
Build a business-aligned, risk-aware, holistic security strategy: gather business requirements to prioritize improvements; assess risks, stakeholder expectations, and risk appetite to set meaningful targets; conduct a comprehensive gap analysis to identify improvements; and build a flexible...
Align the information security strategy to organizational goals and risks to create value.
Build a business-aligned, risk-aware, holistic security strategy: gather business requirements to prioritize improvements; assess risks, stakeholder expectations, and risk appetite to set meaningful targets; conduct a comprehensive gap analysis to identify improvements; and build a flexible roadmap to set the program on the right footing..
Security Strategy
Academy Course: Security
Tailor best practices to effectively manage information security. This course makes up part of the Security & Risk Certificate.
Integrate Physical Security and Information Security
Blueprint: Security
Facing ever-increasing security threats, many organizations are unifying physical, cyber, and information security systems to gain the long-term overall benefits a consolidated security strategy provides.
Securing information security, physical security, or personnel security in silos may secure nothing.
Integrate Physical Security and Information Security. Solution Set. blueprint. Security. physical security personnel security information security security integration integration of physical security and information security operational technology security governance awareness and cross-training security processes security risks security policies and procedures incident response disaster recovery business continuity plan security incident response team LFBP. Facing ever-increasing security threats, many organizations are unifying physical, cyber, and information security systems to gain the long-term overall benefits a consolidated security strategy provides.. Securing information security, physical security, or personnel security in silos may secure nothing..
Integrate Physical Security and Information Security Communication Deck
Templates And Policies: Security
Use this communication deck template to present the results of the integrated security plan to stakeholders. This information security communication deck will help ensure that you're communicating effectively for your cause.
Government: Considerations for a Security Strategy
Note: Industry Coverage
Governments are focused on improving areas of security across people, process, and technology. Here is what we’ve learned across 15 security governance workshops with government agencies.
HR Security: Governments tend to be proficient at screening new employees and properly terminating or modifying employee access during a termination/change in employment. Physical Security: Governments tend to be proficient at controlling visitor/guest access and physically securing ingress and egress points.
Future-Proof Your Security Program: 2025 Security Trends
Live Webinar:
Responding to these threats will require new security skills.
Secure Your High-Risk Data
Live Webinar:
A multi-layered approach that covers all the bases and data sources and comprehensive security that’s as fluid as the data it protects. In today’s complex and dynamic tech landscape, securing data is no longer as simple as implementing a set of controls around a specific application and database.
Implement Hardware Asset Management
Blueprint: Infrastructure & Operations
Asset Security Policy
Templates And Policies: Infrastructure & Operations
This template will assist your organization in developing an IT asset security policy.
CryptoMill’s Circles of Trust Address the Growing Need for Secure, Intuitive File Sharing
Note: Security
Circles of Trust aim to reduce data breaches by protecting data such that only known, trusted people can access it.
An attacker accessing your network, cloud, or email server would simply see encrypted files. It protects data against emails mistakenly sent to the wrong recipient or devices that may be lost or stolen. It takes the pain out of securely sharing documents for group projects as it boasts intuitive, seamless, and transparent protection.
Secure Software Development in Government
Note: Industry Coverage
In today’s world, where information is power, where technology is permeating every corner of our lives, new security and safety concerns of the people must be at the forefront of all government actions.
In today’s world, where information is power, where technology is permeating every corner of our lives, new security and safety concerns of the people must be at the forefront of all government actions.
Improve Your Cybersecurity Posture Through Effective Policy
Live Webinar:
Develop and Deploy Security Policies Enhance your overall security posture with a defensible and prescriptive policy suite.
Build a Cost-Effective Security Compliance Program
Live Webinar:
Most organizations are now spending 25 to 40% of their security budget on compliance activities, but only about a quarter of businesses believe that government-mandated regulations actually help improve their cybersecurity practices.
Don’t Be Shellshocked - Eliminate the Security Risks of Shellshock Quickly
Note: Security
Eliminate the security risks of Shellshock quickly. A brief research note for Info-Tech’s members.
Shellshock has been rated one of the highest security risks possible.
Cost-Optimize Your Security Budget
Live Webinar:
A cost-optimized security budget is one that reduces the greatest amount of risk for the least amount of money.
Embed Privacy and Security Culture Within Your Organization
Blueprint: Security
A strong security program and privacy framework are fundamental to successful organizations and require a proactive approach that embeds principles in the operational seams of the organization. But building a privacy and security culture extends beyond projects, controls, and metrics, and it...
Drive employee engagement with privacy and security via governance and process integration.
A strong security program and privacy framework are fundamental to successful organizations and require a proactive approach that embeds principles in the operational seams of the organization.
Embed Privacy and Security Culture Within Your Organization – Executive Brief
Note: Security
Privacy and security are two heavy-hitting items that all organizations need to account for. Technical controls are a start, but privacy and security need to become part of the organizational culture.
What a Doctor’s Access Levels Have to Do With Everyone’s Health (Data)
Note: Industry Coverage
Securing on-premises and remote access for doctors and other healthcare professionals is imperative to keep hospitals out of the paper and all of our health data protected.
Security or Quality…Why Can’t I Have Both?
Tech Note: Vendor Management
A recent survey sponsored by SAI Global indicates that consumers value data protection over quality. According to the results, three quarters of the respondents said they would be willing to live with lesser quality products if it meant increased security.
According to the results, three quarters of the respondents said they would be willing to live with lesser quality products if it meant increased security.
Develop and Deploy Security Policies
Blueprint: Security
Application Security Policy Template
Templates And Policies: Security
Info-Tech's Security Policy templates allow you to easily develop new policy documents.
Filter by Content Type
- All Results
- Software Reviews (1032)
- Note (832)
- Templates And Policies (224)
- Blueprint (193)
- Tool (163)
- Video (92)
- Tech Note (81)
- In The News (56)
- Live Webinar (26)
- Industry (20)
- Press Release (19)
- Job Description (15)
- Diagnostic (14)
- Academy Course (10)
- Case Study (4)
- Knowledge Base (3)
- Concierge Services (2)
- Site Page (2)
- Workshop (2)
- Podcast (1)
- Research Center (1)
- Strategic Tool (1)