91Ƭ

Security - Storyboard

The First 100 Days as CISO – Phases 1-5

Your first 100 days are the ultimate predictor of your long-term success. Make it count by following Info-Tech's five-step approach.

91Ƭ a Security Metrics Program to Drive Maturity – Phases 1-2

This blueprint will help you set SMART goals and metrics to measure your progress, as well as develop reporting strategies for various metric types.

91Ƭ a Security Metrics Program to Drive Maturity – Phase 1: Link Security Metrics to Goals to Boost Maturity

This phase of the blueprint, 91Ƭ a Security Metrics Program to Drive Maturity, will help you set SMART goals and metrics to measure your progress.

91Ƭ a Security Metrics Program to Drive Maturity – Phase 2: Adapt Your Reporting Strategy for Various Metric Types

This phase of the blueprint, 91Ƭ a Security Metrics Program to Drive Maturity, will help you create a reporting strategy for various types of metrics.

Design a Coordinated Vulnerability Disclosure Program – Phases 1-2

This storyboard will help you develop a methodology for receiving vulnerability reports from external parties.

Design a Coordinated Vulnerability Disclosure Program – Phase 1: Assess Goals

This phase of the blueprint, Assess Goals, will help you identify business requirements, customer expectations, and compliance obligations for the coordinated vulnerability...

Design a Coordinated Vulnerability Disclosure Program – Phase 2: Formalize the Program

This phase of the blueprint, Formalize the Program, will help you create a coordinated vulnerability disclosure policy and plan.

91Ƭ a Data Privacy Program – Phases 1-4

Sell privacy to the business by speaking a language they understand. Take a quantitative approach to integrating privacy within the scope of your organization and build a...

91Ƭ a Data Privacy Program – Phase 1: Collect Privacy Requirements

This phase of the blueprint, 91Ƭ a Data Privacy Program, will help you to understand the key drivers and expectations of privacy from all areas of your organization.

91Ƭ a Data Privacy Program – Phase 2: Conduct a Privacy Gap Analysis

This phase of the blueprint, 91Ƭ a Data Privacy Program, will help you to understand the current state of privacy, identify the target state, and develop gap-closing...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us