A couple of years ago, I was asked to give a keynote talk to the highly secretive National Geospatial-Intelligence Agency (NGA), at its annual Global Research and...
|
|
Use this tool to identify which competencies are most important to your organization, and what your current proficiency is in each competency.
|
|
Once you have completed the CISO Stakeholder Power Map activity, use this tool to create a strategy to cultivate your stakeholder relationships, and manage each...
|
|
Once you have assessed your competency, process, and technology gaps, use this tool to set goals and create an action plan to remediate any gaps.
|
|
Physical access controls define who is allowed physical access to facilities that house information systems, and to the information systems within those facilities and/or...
|
|
The data center access policy will outline the standards for regulating access to the company data center(s).
|
|
The instant messaging usage and security policy outlines the standards for the usage of, and security controls associated with, corporate instant messaging.
|
|
The PDA usage policy outlines standards for connecting to company network(s) or related technology resources via any means involving mobile devices that are categorized...
|
|
The equipment use policy has been designed to inform employees/end users of best practices and policies to protect company-owned equipment and sensitive data stored on...
|
|
The server backup policy protects data from loss or destruction in IT departments within companies. Without a server backup policy, a company’s assets are not as safe as...
|
|