91Ƭ

Storyboard

Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 3: Evaluate Vendors From a Security Perspective

This phase of the blueprint, Ensure Cloud Security in IaaS, PaaS, and SaaS Environments, will help you learn how to assess and communicate with cloud vendors with security...

Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 4: Implement Your Secure Cloud Program

This phase of the blueprint, Ensure Cloud Security in IaaS, PaaS, and SaaS Environments, will help you turn your security requirements into specific tasks and develop your...

Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 5: 91Ƭ a Cloud Security Governance Program

This phase of the blueprint, Ensure Cloud Security in IaaS, PaaS, and SaaS Environments, will help you build the organizational structure of your cloud security governance...

Understand Common IT Contract Provisions to Negotiate More Effectively Storyboard

Use this Blueprint to enhance your contract knowledge. Identify risk, understand legalese, and help your organization protect itself.

Push Organizational Change to the Front Lines Storyboard

If organizational change management efforts don’t reach staff on the front lines then change initiatives are bound to fail. To effectively reach staff, frontline managers...

Push Organizational Change to the Front Lines – Phase 1

This phase of the blueprint, Push Organizational Change to the Front Lines, will help you configure an organizational change management tool and prepare training content...

Reduce and Manage Your Organization's Insider Threat Risk – Phases 1-2

Understand the variety of threats from malicious, accidental, and negligent insiders. Assess security maturity vis-à-vis insider threat. Formally develop an insider threat...

Reduce and Manage Your Organization's Insider Threat Risk – Phase 1: Understand What Insider Threats Are and Where They Come From

This phase of the blueprint, Reduce and Manage Your Organization's Insider Threat Risk, will help you understand the threats and controls associated with insider threat.

Reduce and Manage Your Organization's Insider Threat Risk – Phase 2: Implement an Insider Threat Program

This phase of the blueprint, Reduce and Manage Your Organization's Insider Threat Risk, will help you implement an insider threat program and complete an employee...

Select an Electronic Health Record – Phases 1-3

This storyboard will help you follow a structured approach to select an EHR that is the right fit for your health care institution.
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us