91Ƭ

Security Compliance Process Template

Use this template to help document your information security compliance management program.

Threat Landscape Briefing – October 2020

This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals and hacktivists campaigns, data breaches, control strategies,...

Secure Your High-Risk Data

What’s the key to a data security plan that keeps breaches at bay? A multi-layered approach that covers all the bases and data sources. Comprehensive security that’s as...
  • guided implementation icon

Proteus-Cyber Provides a Tactical Solution for Schrems II Stress With the Transfer Impact Assessment (TIA) Tool

The recent Schrems II invalidation of the EU-US Privacy Shield has added a layer of difficulty for organizations that operate across borders, as they now require additional...

Security Cost Optimization Executive Presentation

Use this template to help communicate your cost optimization action plan.

Data Security Technical Report

Effective data security involves many moving parts, and will require support from a number of key individuals within the organization. The Data Security Technical Report...

Mature Your Identity and Access Management Program – Executive Brief

Read our concise Executive Brief to find out how you improve the organization's Identity and Access Management practices using Info-Tech’s methodology, and understand the...

Secure Your High-Risk Data: Phase 2 – 91Ƭ the Data Security Plan

Begin to close the gaps in your organization’s data security plan by creating a prioritized roadmap of targeted initiatives that cover data-at-rest, in-transit, and in-use

Data Security Matrix

Break down, assess, compare compliance frameworks, and identify gaps in the organization's data security landscape using the Data Security Matrix tool.

Secure Your High-Risk Data: Phase 1 – Review Data Security Methodologies

This phase of the blueprint provides an overview of each of the technical and process controls involved in securing the organization’s high-risk data, mapped to...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us