Tagged - security strategy

Deploying Quantum Encryption in the Satellite Industry

As we continue into the age of quantum mechanics, organizations using encryption must begin to consider a future where these methods will no longer be sufficient as a...

Use Your Security Strategy to Put the Fun Back In Compliance

Compliance-related ennui is curable. Learn how to use your security strategy controls to manage your compliance obligations and make work fun again.

Government: Considerations for a Security Strategy

Governments are focused on improving areas of security across people, process, and technology. Here is what we’ve learned across 15 security governance workshops with...

Build an Information Security Strategy

Technology sophistication and business adoption, the proliferation of hacking techniques, and the expansion of hacking motivations from financial to now social,...
  • guided implementation icon

Dive Into Five Years of Security Strategies

Since 2013, Info-Tech’s “Build an Information Security Strategy” research has been used to help our members build their security programs. Using our own Security...

Dive Into Five Years of Security Strategies Executive Brief

Read this Executive Brief to understand what it means to review five years of security strategies.

Dive Into Five Years of Security Strategies Storyboard

This storyboard will help you review how organizations are building their security strategies.

Encrypt Your Classified Data or Pay the Price: Data Breaches Among American Retailers Are on the Rise

American retailers should move towards a combined encryption and data classification strategy to increase their protection against data breaches now that 75% of American...

Align Your Security Controls to Industry Frameworks for Compliance

When assessing your information security program against an industry framework, don’t reinvent the wheel; use the tools in this blueprint to align your current assessment...

Align Your Security Controls to Industry Frameworks for Compliance – Storyboard

When assessing your information security program against an industry framework, don’t reinvent the wheel; use the tools in this blueprint to align your current assessment...
GET HELP Contact Us
×
VL Methodology