Use this comprehensive workbook to take a detailed, capability-based approach to assessing and selecting the right tools for your unique security needs.
- List, map, and analyze your desired and current capabilities.
- Set out optimization initiatives for capabilities that are either used and not optimized or available and desired.
- Set out cost recovery plans and justify capability overlaps or unused capabilities.