CEOs/CXOs are looking to hire or develop a senior security leader and aren't sure how to identify the best candidate. Organizations are looking to optimize their security...
|
|
Use this blueprint to hire or develop a world-class CISO with the competencies that suit your specific organizational needs. Once you have identified the right candidate,...
|
|
Security leaders who support operations in high-risk jurisdictions contend with unique risk scenarios, including local compliance risk, high-risk travel, and telework from...
|
|
Use this storyboard to build a process that will identify, assess, and address information security and privacy risks in high-risk jurisdictions.
|
|
Use this Excel tool as the repository for security and privacy risks in high-risk jurisdictions. Describe the risk profile of key risk scenarios, analyze your risk...
|
|
Use this template to develop digital safety guidelines for international travel.
|
|
Use this template to develop guidelines for compliance with local security and privacy laws.
|
|
Managing risk has never been more important. Ensure that your organization has an established and manageable way of governing a process related to identifying, assessing,...
|
|
Use this tool to identify which competencies are most important to your organization, and what your current proficiency is in each competency.
|
|
Once you have assessed your competency, process, and technology gaps, use this tool to set goals and create an action plan to remediate any gaps.
|
|