CEOs/CXOs are looking to hire or develop a senior security leader and aren't sure how to identify the best candidate. Organizations are looking to optimize their security...
|
|
Use this blueprint to hire or develop a world-class CISO with the competencies that suit your specific organizational needs. Once you have identified the right candidate,...
|
|
Security leaders who support operations in high-risk jurisdictions contend with unique risk scenarios, including local compliance risk, high-risk travel, and telework from...
|
|
Use this storyboard to build a process that will identify, assess, and address information security and privacy risks in high-risk jurisdictions.
|
|
Use this Excel tool as the repository for security and privacy risks in high-risk jurisdictions. Describe the risk profile of key risk scenarios, analyze your risk...
|
|
Use this template to develop digital safety guidelines for international travel.
|
|
Use this template to develop guidelines for compliance with local security and privacy laws.
|
|
Use this tool to identify which competencies are most important to your organization, and what your current proficiency is in each competency.
|
|
Once you have assessed your competency, process, and technology gaps, use this tool to set goals and create an action plan to remediate any gaps.
|
|
A small university in the American mid-west needed to introduce its IT stakeholders to key risk concepts as part of a new, broader IT governance mission. By gaining a...
|
|