Tagged - NIST

Develop and Deploy Security Policies

Informal, un-rationalized, ad hoc policies are ineffective because they do not explicitly outline responsibilities or compliance requirements, and they are rarely...
  • guided implementation icon

Acceptable Use of Technology Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Navigate Zero-Trust Security in Healthcare Storyboard

Achieving zero-trust is an iterative process that involves a range of capabilities and requires stakeholders to be committed to improving a healthcare organization’s...

Navigate Zero-Trust Security in Healthcare

Achieving zero-trust is an iterative process that involves a range of capabilities and requires stakeholders to be committed to improving a healthcare organization’s...

Discover and Classify Your Data – Phase 1: Formalize the Classification Program

This phase of the blueprint will help you understand the importance of data classification and aid you in developing a classification scheme that meets your...

Discover and Classify Your Data – Phases 1-3

This storyboard will help you define and develop your data classification program, from formalizing the program to discovering your data and finally implementing data...

Discover and Classify Your Data – Executive Brief

Read this Executive Brief to understand why data classification is an initiative for the entire organization and how this blueprint can help simplify the process.

Discover and Classify Your Data

The sensitivity of data varies significantly, from public information to highly confidential trade secrets. To ensure proper protection, businesses need to identify and...
  • guided implementation icon

Build a Cloud Security Strategy – Phase 2: Prioritize Initiatives and Construct a Roadmap

This phase of the blueprint Build an Cloud Security Strategy will help you prioritize and roadmap action items to better secure the cloud.

Cloud Security Strategy Template

This template, part of the blueprint Build a Cloud Security Strategy, will serve as a repository of information about your approach to securing the cloud.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us