Many K-12 schools and districts do not have sufficient resources to adequately address information security needs. Having a well-defined information security plan that is...
|
|
Use this storyboard to augment your security strategy by ensuring alignment with business objectives, assessing your organization's risk and stakeholder expectations,...
|
|
Use this tool to identify goals and compliance obligations and make explicit links to how security initiatives propose to support these interests. Then define the scope...
|
|
Use this communication deck template to present the results of the security strategy to stakeholders, demonstrate the progression from the current state to the future...
|
|
Your first 100 days are the ultimate predictor of your long-term success. Make it count by following Info-Tech's five-step approach.
|
|
Read this Executive Brief to understand Info-Tech's five-step approach to conquering your first 100 days as a CISO.
|
|
Your first 100 days are the ultimate predictor of your long-term success. Make it count by following Info-Tech's five-step approach.
|
|
Use Info-Tech's CISO Diary to access stakeholder interview questions and to record and summarize your stakeholder interviews.
|
|
Use Info-Tech's Introduction Sheet to create a short communication memo to send to your colleagues on your first day.
|
|
Use Info-Tech's Diagnostic Benchmarks: Security Governance & Management Scorecard to compare your results against your peers.
|
|