This is one of eight security awareness and training templates that can be used to educate end users on best practices. This presentation focuses on mobile security.
|
|
This is one of eight security awareness and training templates that can be used to educate end users on best practices. This presentation focuses on phishing.
|
|
This is one of eight security awareness and training templates that can be used to educate end users on best practices. This presentation focuses on social engineering.
|
|
This is one of eight security awareness and training templates that can be used to educate end users on best practices. This presentation focuses on web usage.
|
|
This template is meant to demonstrate how security responsibilities can be incorporated into a job description for any employee in order to build security accountability...
|
|
Formalizing a risk management program requires creating repeatable and iterative processes, and documenting best practices. Create a comprehensive manual to serve as the...
|
|
It’s impossible to make intelligent decisions about risks without knowing what they’re worth. Use Info-Tech’s Risk Costing Tool to calculate the expected cost of IT’s...
|
|
Integrate IT risk management with business risk management by creating a paper trail for key risks.
|
|
Create a succinct, impactful document that summarizes the outcomes from the risk assessment and highlights the IT risk council’s top recommendations to the senior...
|
|
Use this tool to identify which competencies are most important to your organization, and what your current proficiency is in each competency.
|
|