Tagged - gap analysis

Build an Information Security Strategy

Build a business-aligned, risk-aware, holistic security strategy: gather business requirements to prioritize improvements; assess risks, stakeholder expectations, and...
  • guided implementation icon

IT Strategy Case Study of a Large Manufacturing Company

Increasing business complexity has been driven by both organic growth and acquisitions. IT had to align its people, projects, and resources with the Company's innovative...

Security Policy Prioritization Tool

The Security Policy Prioritization Tool helps your organization prioritize your policy suite based on Importance, Ease to Implement and Ease to Enforce.

DRP Workshop Summary for a Mid-Sized Insurance Company

The existing Business Continuity Plan lacked the specific details of a step-by-step incident response plan, and failed to account for all potential disaster scenarios. IT...

Right-Sizing DRP Case Study of a State Government Agency

Increasing complexity within the environment, with competing priorities within the organization, made it challenging to create an actionable DRP or even to know where to...

Cloud Security Architecture Reference Model

Plot your findings from the Workbook and Archive Document to see the current state of your cloud security architecture, the risks, and where you still need to go.

Talent Implications Checklist

Use this checklist to help identify talent implications from your organization's strategy that will inform HR strategy and priorities.

IT Strategy Case Study of a Mid-Sized Health Care Organization

Performance and ability to support future growth were being challenged by an increasingly complex healthcare market and ever-tightening budgets. IT needed to chart a new...

Threat Preparedness Using MITRE ATT&CK® – Executive Brief

Read our concise Executive Brief to find out why threat preparedness is a crucial first step in defending your network against any attack type. Review Info-Tech’s...

Information Security Strategy Communication Deck for K-12

Use this communication deck template to present the results of the security strategy to stakeholders, demonstrate the progression from the current state to the future...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us