Organizations require an effective security architecture in order to connect security to the business. This blueprint demonstrates Info-Tech's approach to evaluating the...
|
|
This tool guides organizations in evaluating the complexity of their IT environment, their operational maturity, and the perceived value of security architecture. It then...
|
|
This video acts as a virtual tour through the Security Architecture Recommendation Tool. Use it to gain a better understanding of the purpose and functionality of the tool.
|
|
Use the results of the assessments from Phase 1 to build a three-year roadmap for improving the security program as a whole.
|
|
Use this template to create a one-pager that summarizes your prototyping results and helps you build a budget pitch.
|
|
Read this Executive Brief follow our methodology of discovering the hidden needs of the business and developing solutions that solve business problems.
|
|
Use this tool to design a stakeholder research study and record your observations to validate your stakeholder journey map.
|
|
Use this template to document the journey maps you create in working sessions with your design team.
|
|
This phase will walk you through creating the first iteration of your journey map, creating hypotheses, and collecting the necessary data to test your hypotheses and...
|
|
Use this template to structure and record the outputs of stakeholder interviews that you conduct. You may modify the questions as needed or read the questions verbatim to...
|
|