Tagged - LFBP

Security Governance Model Tool

This tool will help you determine governance and management accountabilities and responsibilities and use them to build a visual governance and management model.

Security Governance Model Templates

The purpose of this tool is to help you visualize your organization’s information security governance structure.

Establish Effective Security Governance & Management

Many organizations misunderstand security governance and management as simply a matter of policies and processes. However, policies and processes – while important – do...
  • guided implementation icon

Prepare for Post-Quantum Cryptography Storyboard

Developing quantum-resistant cryptography capabilities is crucial to maintaining data security and integrity for critical applications. Organizations need to take...

Prepare for Post-Quantum Cryptography

Organizations using encryption must begin to consider a future where these methods will no longer provide sufficient protection. The astounding speed and power of quantum...

Integrate Physical Security and Information Security

Facing ever-increasing security threats, many organizations are unifying physical, cyber, and information security systems to gain the long-term overall benefits a...

Hire or Develop a World-Class CISO

CEOs/CXOs are looking to hire or develop a senior security leader and aren't sure how to identify the best candidate. Organizations are looking to optimize their security...
  • guided implementation icon

Secure Your Hybrid Workforce

The internet is the new corporate network opening organizations to more risks not protected by the current security stack. Using infotech methodology of zero trust is a...

Secure IT/OT Convergence

Secure IT/OT convergence is a negotiation between IT and OT. The essential initial step is to begin with a communication, followed by governing and managing security...

Build an Effective Data Retention Program

This research will help you to determine data retention requirements, create a retention schedule, identify at-risk data, and manage manual data deletion.
  • guided implementation icon
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us