Tagged - security policies

Navigate the HIPAA Landscape

As healthcare organizations embrace innovation they must prioritize secure handling of patient data with robust security protocols. Navigating the complex and evolving...

Navigate the HIPAA Landscape Storyboard

As healthcare organizations embrace innovation, they must prioritize secure handling of patient data with robust security protocols. Navigating the complex and evolving...

HIPAA Policy Templates Suite

Use Info-Tech's HIPAA policy templates to ensure your policies are current, clear, concise, and consistent.

Secure IT/OT Convergence Storyboard

Use this deck to secure IT/OT convergence. The essential initial step is to begin with a communication, followed by governing and managing security priorities and...

Secure IT/OT Convergence

Secure IT/OT convergence is a negotiation between IT and OT. The essential initial step is to begin with a communication, followed by governing and managing security...

Secure IT/OT Convergence Requirements Gathering Tool

Use this tool to map organizational goals to a secure IT/OT goals. This tool serves as a repository for information about the organization, compliance, and other factors...

Secure IT/OT Convergence RACI Chart Tool

Use this tool to identify and understand the owners of various elements of the IT/OT convergence across the organization. This RACI chart will help clearly define each...

Webinar: Improve Cybersecurity Through Effective Policy

Many organizations have cybersecurity policies in place but are unsure of their effectiveness. Learn how Info-Tech can help improve your policy suite to align with best...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us