Tagged - security risk

Navigate the HIPAA Landscape Storyboard

As healthcare organizations embrace innovation, they must prioritize secure handling of patient data with robust security protocols. Navigating the complex and evolving...

Build an IT Risk Taxonomy – Phases 1-3

With the demand for digital capabilities and experiences increasing, the need for real-time risk management has never been greater. Follow this step-by-step process to...

Identify and Manage Security Risk Impacts on Your Organization Storyboard

Use this research to better understand the negative impacts of third-party vendor actions on your organization.

Build, Optimize, and Present a Risk-Based Security Budget – Phases 1-3

This storyboard will help you build a security budget that adapts to risks and threats, while also taking into account your business model, making it easier to...

Build, Optimize, and Present a Risk-Based Security Budget – Phase 1: Review Requirements for the Budget

This phase of the blueprint, Build, Optimize, and Present a Risk-Based Security Budget, will help you gather the requirements needed and review them to ensure you can...

Build, Optimize, and Present a Risk-Based Security Budget – Phase 2: Build the Budget

This phase of the blueprint, Build, Optimize, and Present a Risk-Based Security Budget, will help you build a budget that maps security controls to their business...

Build, Optimize, and Present a Risk-Based Security Budget – Phase 3: Present the Budget

This phase of the blueprint, Build, Optimize, and Present a Risk-Based Security Budget, will help you take your completed budget and communicate the value of security to...

Proactively Identify and Mitigate Vendor Risk – Phases 1-3

This storyboard will help your organization achieve vendor risk readiness by following Info-Tech's methodology.

Proactively Identify and Mitigate Vendor Risk – Phase 1: Review Vendor Risk Fundamentals and Establish Governance

This phase of the blueprint, Proactively Identify and Mitigate Vendor Risk, will help you understand vendor risk fundamentals and establish a risk governance framework.

Proactively Identify and Mitigate Vendor Risk – Phase 2: Assess Vendor Risk and Define Your Response Strategy

This phase of the blueprint, Proactively Identify and Mitigate Vendor Risk, will help you categorize, prioritize, and assess your vendor risks, followed by selecting...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us