|
Use this template as a reference to design an IT risk taxonomy to suit your organization鈥檚 needs, starting with level 1 and working down.
|
|
|
Use this charter template to create a cross-functional IT risk taxonomy committee.
|
|
|
With the demand for digital capabilities and experiences increasing, the need for real-time risk management has never been greater. Follow this step-by-step process to...
|
|
|
The pace and uncertainty in the current business environment introduces new and emerging vulnerabilities that can disrupt an organization鈥檚 strategy on short notice....
|
|
|
Yesterday, Vector Institute gave a webinar on 鈥淯sing AI to guide re-opening of workplaces in the wake of COVID-19.鈥 Can AI truly help? Read on to find out.
|
|
|
Once you've identified IT's supporting tasks, it's time to prioritize. This phase walks through the activity of prioritizing based on cost/effort, alignment to business,...
|
|
|
This phase of the blueprint will help you report on risk based on the requirements needed within your organization.
|
|
|
This phase of the blueprint will help you collect, analyze, and aggregate security risks in order to gain a view into the organizational risk profile.
|
|
|
This phase of the blueprint will help you develop a methodology for conducting threat and risk assessments across any project or initiative across the IT department.
|
|
|
This phase of the blueprint will help you define responsibilities and accountabilities within your security risk management program and an organizational risk tolerance level.
|
|