Security Risk, Strategy & Governance - Blueprints

Determine Your Zero Trust Readiness

Traditionally, IT security was typified by perimeter security, like you would see in a castle and moat, where if you could get through the front gates, you were trusted...
  • guided implementation icon

The First 100 Days as CISO

Your first 100 days are the ultimate predictor of your long-term success. Make it count by following Info-Tech's five-step approach.
  • guided implementation icon

Build a Data Privacy Program

Sell privacy to the business by speaking a language they understand. IT and InfoSec leaders need to see privacy as more than just compliance – as a driver of business...
  • guided implementation icon

Tech Trend Update: If Digital Ethics Then Data Equity

The COVID-19 crisis demands solutions, and some technologists might insist it's time to move fast and break things. But building new technologies without digital ethics...

Responsibly Resume IT Operations in the Office

As the post-pandemic landscape begins to take shape, ensure that IT can effectively prepare and support your employees as they move back into the office. Once the office...
  • guided implementation icon

Ensure Your Pandemic Response Plan Is Privacy-Proof

Don't let panic negate the need for privacy best practices. Keep privacy at the core of your pandemic response plan and build a program that is time sensitive, scalable,...

2020 Security Priorities Report

Use this deck to learn what projects security practitioners are prioritizing for 2020.
  • guided implementation icon

Demonstrate Data Protection by Design for IT Systems

Privacy is now considered an integral part of information security. In fact, consumers often want more than a company’s word that their data is secure; they want to see...
  • guided implementation icon

Develop a Security Awareness and Training Program That Empowers End Users

Cyberattackers target your end users, who remain today’s weakest link in organizational security. Design and deliver an effective and up-to-date training program to...
  • guided implementation icon

Satisfy Customer Requirements for Information Security

Your customers and potential customers are increasingly demanding assurance that you will meet their information security requirements. Discover best practices for...
  • guided implementation icon
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us