This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you define your meeting agendas and the procedures to support those...
|
|
This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you determine how information will flow between the committee and...
|
|
This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you define your committee.
|
|
This storyboard will help you set up your steering committee and identify the key players, their responsibilities and the capabilities of your committee.
|
|
Successful information security governance requires a venue to address security concerns with participation across the entire business. Without access to requisite...
|
|
Security budgets are unlike other department budgets. Increases or decreases in the budget can drastically affect the organizational risk level. Info-Tech’s methodology...
|
|
Once you have assessed your competency, process, and technology gaps, use this tool to set goals and create an action plan to remediate any gaps.
|
|
Once you have completed the CISO Stakeholder Power Map activity, use this tool to create a strategy to cultivate your stakeholder relationships, and manage each...
|
|
Use this tool to identify which competencies are most important to your organization, and what your current proficiency is in each competency.
|
|