Tagged - security framework

Dive Into Five Years of Security Strategies

Since 2013, Info-Tech’s “Build an Information Security Strategy” research has been used to help our members build their security programs. Using our own Security...

Dive Into Five Years of Security Strategies Executive Brief

Read this Executive Brief to understand what it means to review five years of security strategies.

Dive Into Five Years of Security Strategies Storyboard

This storyboard will help you review how organizations are building their security strategies.

Align Your Security Controls to Industry Frameworks for Compliance

When assessing your information security program against an industry framework, don’t reinvent the wheel; use the tools in this blueprint to align your current assessment...

Align Your Security Controls to Industry Frameworks for Compliance – Storyboard

When assessing your information security program against an industry framework, don’t reinvent the wheel; use the tools in this blueprint to align your current assessment...

Control Framework Mapping Tool

This tool provides an easy cross-reference from Info-Tech's control framework to multiple NIST standard control frameworks.

Control Framework Mapping Reporting Tool

This tool generates reports based on mapping Info-Tech's control framework to multiple NIST standard control frameworks.

Identify Opportunities to Mature the Security Architecture

Organizations require an effective security architecture in order to connect security to the business. This blueprint demonstrates Info-Tech’s approach to evaluating the...
  • guided implementation icon

Identify Opportunities to Mature the Security Architecture – Executive Brief

Discover why every organization needs an appropriate security architecture. Review how this blueprint will assist with the development of a right-sized security...

Identify Opportunities to Mature the Security Architecture – Phases 1-2

Organizations require an effective security architecture in order to connect security to the business. This blueprint demonstrates Info-Tech's approach to evaluating the...
GET HELP Contact Us
×
VL Methodology