- The rate of technological change is accelerating. Organizations continue to invest in technology to run the business, layering more systems to support remote work, enhance customer experience, and generate value.
- Meanwhile, security threats are growing. Disruptive cyberattacks are more prevalent, sophisticated, and impactful than ever, targeting organizations of all industries and sizes.
- Security leaders need to adopt a proactive approach to secure the organization now and prioritize funding to high-risk areas.
Our Advice
Critical Insight
- Technological change is increasing both the protect surface and the variety of tools available to secure it.
- Security frameworks are helpful, but they don’t describe how to gather business requirements, identify organizational risks, or set an appropriate target state for the program, or which controls to select to conduct an accurate gap analysis for the security program.
- The better security leaders can balance a budget that funds cyber resiliency and drives revenue, the more likely they are to progress in their career.
Impact and Result
Build a business-aligned, risk-aware, holistic security strategy:
- Gather business requirements to prioritize improvements.
- Assess risks, stakeholder expectations, and risk appetite to set meaningful targets.
- Do a comprehensive gap analysis to identify improvements.
- Build a flexible roadmap to set the program on the right footing.
Member Testimonials
After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve. See our top member experiences for this blueprint and what our clients have to say.
9.7/10
Overall Impact
$40,306
Average $ Saved
36
Average Days Saved
Client
Experience
Impact
$ Saved
Days Saved
Des Moines Water Works
Guided Implementation
10/10
$13,700
20
The best part was the knowledge and patience Isabelle had as I worked through the process. Time is always my biggest constraint and even working o... Read More
HEALTH CARE COMPLAINTS COMMISSION
Guided Implementation
10/10
$7,280
8
Robert Dang performed at least four analyst calls with our Cyber Security Manager, each one estimated to have saved at least two days of time. The ... Read More
Ontario Medical Association
Workshop
10/10
$23,500
5
love the engagement and thoughtful and insightful prompts to ensure we stay focused and continue working towards strategy.
Vancouver Public Library
Workshop
9/10
$2,000
5
It was a well organized and productive workshop. Felt like we accomplished significant amount of work through the workshop.
Fundación Universidad de las Américas Puebla
Guided Implementation
9/10
N/A
29
Jon was the best part, he has a welth of knowledge and is always eager to help, he directed the experience perfectly making it easy to understand a... Read More
Unity Homes, Inc
Guided Implementation
10/10
$50,000
110
The best part of my experience working with Mike Brown was his unparalleled cybersecurity expertise and ability to tailor solutions to fit the spec... Read More
State of Michigan
Workshop
9/10
$34,250
50
Working through the objectives with the coordinator. The coordinator was able to work through all points on contention and be fluid throughout the ... Read More
Seattle Indian Health Board Inc
Guided Implementation
10/10
$34,250
50
Really good information and friendly analyst. A little overwhelming because there is so much to consider.
Jamul Casino
Workshop
10/10
$13,700
29
Great workshop, highly recommended for any organization looking to develop a road map for their Security posture. Amazing Facilitator Horia Rosian,... Read More
Evommune, Inc.
Guided Implementation
9/10
$34,250
10
Colorado Early Colleges
Guided Implementation
8/10
$13,700
2
Mike laid out the scope and needs very clearly. The worst part was realizing how much work remains to be done to reach the maturity level I want to... Read More
The Corporation of the City of Kingston
Workshop
8/10
$25,000
20
Dave K is an excellent facilitator, providing meaningful direction and guidance to our team, keeping the sessions moving and on time.
City of Allen, TX
Guided Implementation
10/10
N/A
10
Kruger Services Inc.
Guided Implementation
8/10
$10,000
5
Advice and ready to use tool was great.
University of Limpopo
Workshop
10/10
$60,000
60
The best parts were when the facilitator allowed the team to discover requirements and gaps on their own. He subtly resisted to giving the inputs ... Read More
Dufferin Peel Catholic District School Board
Guided Implementation
10/10
N/A
12
The President and Fellows of Harvard College, a Massachusetts nonprofit corporation, acting by and through Harvard Business School
Workshop
10/10
$68,500
85
Outstandingworkshop and engagement. We learned a great deal, and flexibility was key. Facilitation was outstanding.
Wiss, Janney, Elstner Associates, Inc.
Guided Implementation
10/10
$68,500
120
I recently participated in an online workshop led by Petar, and it was an outstanding experience. Petar brings an incredible wealth of knowledge an... Read More
California Department of Health Care Services
Guided Implementation
10/10
N/A
50
Viktor was very helpful, knowledgeable and easy to work with, thanks!
Abbott Laboratories
Guided Implementation
10/10
$30,140
5
Mike was extremely helpful and supportive throughout the process, we were able to complete the activity and received much needed assistance.
State of New Mexico - New Mexico Department of Public Safety
Guided Implementation
10/10
$41,100
120
It is difficult to quantify both the time saved and the value impact of my engagement with Jon. The blueprint itself is helpful but having Jon and ... Read More
Kinark Child And Family Services
Guided Implementation
8/10
N/A
18
The experience working with Petar was great. He was very thorough in helping us achieve our goals. We will work with him again if and when given th... Read More
National Cooperative Bank NA
Workshop
8/10
$13,700
10
Overall, the experience was positive. This workshop marked the third occurrence in the past decade. With the implementation of an independent thre... Read More
Oak Valley Health
Guided Implementation
10/10
$25,000
9
State of New Mexico Early Childhood & Care Department
Guided Implementation
10/10
N/A
120
Donor Network West
Guided Implementation
10/10
$13,700
5
Very good advice on what to focus on and how to approach regulators. worst part was realizing all the work that I still had to do.
A. Farber Associates
Workshop
10/10
$100K
120
The best parts of my experience were the exceptional expertise of Dave Kernohan, the comprehensive and well-structured workshop content, the benefi... Read More
CNY Centro, Inc.
Guided Implementation
10/10
N/A
N/A
Jon was awesome to work with and had a wealth of knowledge. He was patient with us when were having problems understanding certain topics, and took... Read More
El Dorado Irrigation District
Guided Implementation
10/10
$2,740
5
GSW Manufacturing
Guided Implementation
9/10
$9,590
5
The level of detail in the review of our system was impressive. It does help to focus our efforts on research from InfoTech that will make the mos... Read More
Security Strategy
Tailor best practices to effectively manage information security.
This course makes up part of the Security & Risk Certificate.
- Course Modules: 5
- Estimated Completion Time: 1 hour
Workshop: Build an Information Security Strategy
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Module 1: Assess business requirements
The Purpose
- Assess business requirements.
Key Benefits Achieved
- Identify security program alignment criteria.
Activities
Outputs
Understand business and IT strategy and plans.
Define business and compliance requirements.
Establish the security program scope.
Analyze the organization’s risks and stakeholder pressures.
Assess organizational risk appetite.
- Goals cascade for the security program
- Security scope and boundaries statement
- Risk assessment and pressure analysis
- Organizational risk appetite
Module 2: Perform a gap analysis
The Purpose
- Perform a gap analysis.
Key Benefits Achieved
- Define the program's target state.
- Assess the organization's current state.
Activities
Outputs
Define the information security target state.
Assess current security capabilities.
Identify security gaps.
Build initiatives to bridge the gaps.
- Information security target state
- Security current state assessment
- Initiatives to address gaps
Module 3: Complete the gap analysis
The Purpose
- Complete the gap analysis.
Key Benefits Achieved
- Security program improvement tasks and initiatives
Activities
Outputs
Continue assessing current security capabilities.
Identify security gaps.
Build initiatives to bridge the maturity gaps.
Identify initiative list and task list.
Define criteria to be used to prioritize initiatives.
- Completed security current state assessment
- Task list to address gaps
- Initiative list to address gaps
- Prioritization criteria
Module 4: Develop roadmap
The Purpose
- Develop the roadmap.
Key Benefits Achieved
- Security program roadmap
- Communication resources
Activities
Outputs
Conduct cost-benefit analysis on initiatives.
Prioritize gap initiatives based on cost, time, and alignment with the business.
Build effort map.
Determine start times and accountability.
Finalize security roadmap and action plan.
Create communication plan.
- Information security roadmap
- Draft communication deck