Info-Tech's Security Policy templates allow you to easily develop new policy documents.
|
|
IT, business, and innovation leaders alike must take a progressive approach to understanding digital risk within the context of their organizations. During this session...
|
|
IT departments are tasked with implementing new projects, but are often unsure how to assess the risk. Often, they use informal discussions that do not allow the business...
|
|
Use this tool to determine how impact and frequency ratings given to risks should be weighted.
|
|
Security budgets are unlike other department budgets. Increases or decreases in the budget can drastically affect the organizational risk level. Info-Tech’s methodology...
|
|
Read this Executive Brief to understand how to build a risk-based budget and what requirements you need for a defensible security budget.
|
|
This storyboard will help you build a security budget that adapts to risks and threats, while also taking into account your business model, making it easier to...
|
|
This phase of the blueprint, Build, Optimize, and Present a Risk-Based Security Budget, will help you gather the requirements needed and review them to ensure you can...
|
|
This phase of the blueprint, Build, Optimize, and Present a Risk-Based Security Budget, will help you build a budget that maps security controls to their business...
|
|
This tool will allow you to build a security budget that maps security controls to the business capabilities they enable, while creating three different budget options...
|
|