Tagged - security controls

Establish Effective Security Governance & Management – Phases 1-2

Use this storyboard to develop an information security governance and management model and implement essential governance processes.

Build a Cybersecurity Services Offering

Use this blueprint to develop a well-scope, standardized, and yet differentiating cybersecurity services for your IT Consulting or IT Service Provider business that...

Security Service Design Workbook

The Security Service Design Workbook comprises all the tools and templates used as part of our process to design the differentiated service offering and standardize the...

Build a Cybersecurity Services Offering Storyboard

This storyboard explains the methodology for creating complete, well-scoped, standardized cybersecurity service offerings that align to a well-known cybersecurity control...

Cybersecurity Service Design Workbook

The Security Service Design Workbook comprises all the tools and templates used as part of our process to design the differentiated service offering and standardize the...

Use Your Security Strategy to Put the Fun Back In Compliance

Compliance-related ennui is curable. Learn how to use your security strategy controls to manage your compliance obligations and make work fun again.

Baking Cybersecurity Into the Cannabis Industry

The cannabis market is undergoing explosive growth in all directions. Traditional strategic approaches to information security are unlikely to keep up in an era of...

Security Operations Collaboration Plan

The Security Operations Collaboration Plan identifies opportunities for optimization through collaboration and cross-training.

Develop a Security Operations Strategy

Current security practices are disjointed, operating independently with a wide variety of processes and tools to conduct incident response, network defense, and threat...

Concept of Operations Maturity Assessment Tool

The Concept of Operations Maturity Assessment Tool will help you systematically understand your current security state. Based on Info-Tech's maturity model, evaluate the...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us