Use these notes to apply cost-savings across your department. Discover cost savings in every aspect of your cost-to-serve expenses, and use the guidance and tools below...
|
|
The role of the Chief Risk Officer is to directly assess and holistically manage all aspects of risk brought to bear on the enterprise by IT security and...
|
|
A small university in the American mid-west needed to introduce its IT stakeholders to key risk concepts as part of a new, broader IT governance mission. By gaining a...
|
|
Engaging with Info-Tech to conduct a COBIT-based operations workshop on risk management was a natural next step.
|
|
A 20-person IT department in a mid-sized regional grocery retailer received a mandate from its Board of Directors to reapproach and increase its risk management...
|
|
An Asian-headquartered chemical manufacturing organization with an 80-year history and facilities in over 20 countries wants to assess IT risks for its operations in the...
|
|
Security pressure posture analysis helps your organization assess your real security context and enables your organization to invest in the right security functions while...
|
|
Use this tool to map business and IT initiatives to specific security mitigation controls. This tool is a documentation and mapping support tool as part of your larger...
|
|
Communication between security and the rest of the business can be difficult because the two parties often speak different languages. Your security messages should be...
|
|
A formalized security organizational structure assigns and defines the security roles and responsibilities of different members in the organization. Clarity of...
|
|