Information Security Requirements Gathering Tool for K-12

Author(s): Kate Wood, Bob Wilson

1 Download

Speak With Representative
Access this content by contacting one of our representatives for assistance.

Use this tool to formally identify business goals, customer and compliance obligations, and make explicit links to how security initiatives propose to support these business interests.

Then define the scope and boundaries for the security strategy, and the risk tolerance definitions that will guide future security risk decisions.

Use this tool in conjunction with the project blueprint Build an Information Security Strategy for K-12 Schools.

Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019