91Ƭ

All 91Ƭ

Secure Your High-Risk Data: Phase 3 – Implement the Data Security Plan

Tie off any loose ends in your data security plan, by ensuring impacted staff are properly trained and supported. Identify and track metrics for each of the control...

Data Security Executive Report

Focus on the key metrics your senior leadership team wants to see. Use this executive report template to show how the organization's high-risk data is being secured.

Cost-Optimize Your Security Budget

This blueprint will help you rise to the challenge of a cost-optimization mandate by helping you assess how well your people, process, and technology help to lower...
  • guided implementation icon

Cost-Optimize Your Security Budget – Executive Brief

This executive brief will demonstrate the project methodology and thought model, as well as summarize its outcomes.

Cost-Optimize Your Security Budget – Phases 1-3

Use this blueprint to help you cost-optimize your people, process, and technology during economic downturn.

Security Employee Layoff Selection Tool

Use this tool to determine which employees should be selected for layoff and in which order of priority.

Security Cost Optimization Workbook

This tool will help you to work through your cost optimization decisions related to people, process, and technology.

Mature Your Identity and Access Management Program – Executive Brief

Read our concise Executive Brief to find out how you improve the organization's Identity and Access Management practices using Info-Tech’s methodology, and understand the...

ITAM Project Charter Template

Organize your plan to build out your asset management process with a project charter.

IT Asset Management Market Overview

Read the Market Overview to understand what features and capabilities are available in ITAM tools. The right features match is key to making a data heavy and challenging...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us