Tagged - gap assessment

Dive Into Five Years of Security Strategies

Since 2013, Info-Tech’s “Build an Information Security Strategy” research has been used to help our members build their security programs. Using our own Security...

Dive Into Five Years of Security Strategies Executive Brief

Read this Executive Brief to understand what it means to review five years of security strategies.

Dive Into Five Years of Security Strategies Storyboard

This storyboard will help you review how organizations are building their security strategies.

Build an Information Security Strategy

Technology sophistication and business adoption, the proliferation of hacking techniques, and the expansion of hacking motivations from financial to now social,...
  • guided implementation icon

Build an Information Security Strategy – Executive Brief

A weak or non-existent information security strategy will cause organizations to fall behind the curve in the evolving threat landscape. Learn why a strategy is important...

Build an Information Security Strategy – Phases 1-4

Info-Tech has developed and tested a robust information security framework with supporting methodologies to generate your organization’s comprehensive, actionable, and...

Build an Information Security Strategy – Phase 1: Assess Requirements

This phase of the blueprint, Build an Information Security Strategy, will help you bring your security program into alignment with the organization.

Build an Information Security Strategy – Phase 2: Assess Gaps

This phase of the blueprint, Build an Information Security Strategy, will help you define the initiatives that will achieve your security targets across the board.

Information Security Program Gap Analysis Tool

To enable an effective security program, all areas of security need to be evaluated closely to determine where the organization sits currently and where it needs to go to...

Build an Information Security Strategy – Phase 3: Build the Roadmap

This phase of the blueprint, Build an Information Security Strategy, will help you prioritize your security initiatives into an actionable roadmap with your highest...
GET HELP Contact Us
×
VL Methodology