Build an Information Security Strategy
Tailor best practices to effectively manage information security.
Book This Workshop
CISOs often struggle with:
- Lack of understanding how to align their security programs to business goals.
- Uncertainty on how to prioritize security spending.
CISOs can:
- Engage stakeholders and align with business goals.
- Holistically evaluate their security program.
- Rapidly develop a security roadmap.
Book Your Workshop
Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.
Book NowModule 1: Assess Security Requirements
The Purpose
Understand business and IT strategy and plans.
Key Benefits Achieved
Defined security obligations, scope, and boundaries.
Activities: | Outputs: | |
---|---|---|
1.1 | Define business and compliance. |
|
1.2 | Establish security program scope. |
|
1.3 | Analyze the organization’s risk and stakeholder pressures. |
|
1.4 | Identify the organizational risk tolerance level. |
|
Module 2: Perform a Gap Analysis
The Purpose
Define the information security target state.
Key Benefits Achieved
Set goals and Initiatives for the security strategy in line with the business objectives.
Activities: | Outputs: | |
---|---|---|
2.1 | Assess current security capabilities. |
|
2.2 | Identify security gaps. |
|
2.3 | Build initiatives to bridge the gaps. |
|
Module 3: Complete the Gap Analysis
The Purpose
Continue assessing current security capabilities.
Key Benefits Achieved
Identification of security gaps and initiatives to bridge them according to the business goals.
Activities: | Outputs: | |
---|---|---|
3.1 | Identify security gaps. |
|
3.2 | Build initiatives to bridge the maturity gaps. |
|
3.3 | Identify initiative list and task list. |
|
3.4 | Define criteria to be used to prioritize initiatives. |
|
Module 4: Develop the Roadmap
The Purpose
Create a plan for your security strategy going forward.
Key Benefits Achieved
Set path forward to achieving the target state for the business through goal cascade and gap initiatives.
Activities: | Outputs: | |
---|---|---|
4.1 | Conduct cost/benefit analysis on initiatives. |
|
4.2 | Prioritize gap initiatives based on cost and alignment with business. |
|
4.3 | Build an effort list. |
|
4.4 | Determine state times and accountability. |
|
4.5 | Finalize security roadmap and action plan. |
|
4.6 | Create communication plan. |
|
Module 5: Communicate and Implement
The Purpose
Finalize deliverables.
Key Benefits Achieved
Consolidate documentation into a finalized deliverable that can be used to present to executives and decision makers to achieve buy-in for the project.
Activities: | Outputs: | |
---|---|---|
5.1 | Support communication efforts. |
|
5.2 | Identify resources in support of priority initiatives. |
|