91ÖÆÆ¬³§

Tagged - security culture

Establish Effective Security Governance & Management

Many organizations misunderstand security governance and management as simply a matter of policies and processes. However, policies and processes – while important – do not...
  • guided implementation icon

Security Governance Model Templates

The purpose of this tool is to help you visualize your organization’s information security governance structure.

Security Governance Model Tool

This tool will help you determine governance and management accountabilities and responsibilities and use them to build a visual governance and management model.

Webinar: Info-Tech Agenda – Help Us Shape Our Technology 91ÖÆÆ¬³§ for 2021

Become an Info-Tech Influencer. Help shape our research by talking with our analysts. Discuss the challenges, insights, and opportunities in these areas.

Develop a Security Awareness and Training Program That Empowers End Users – Executive Brief

Read this Executive Brief to understand why a human-centric security program is needed to raise your security culture and prevent end users from being your largest...

Security Training Campaign Development Tool

This tool will help you identify user groups within your organization and determine what the risk profile is of each group. It will help you prioritize security training...

Security Awareness and Training Metrics Tool

This tool will help you identify and select metrics for measuring the success of your security awareness and training program.

Security Awareness and Training Program Development Tool

This tool will help you identify initiatives to develop your security awareness and training program. The tool focuses on four areas of initiatives: the fundamentals,...

Develop a Security Awareness and Training Program That Empowers End Users – Phases 1-2

This storyboard will help you develop a security awareness and training program, which includes building a formal awareness and training program to elevate the security...

Develop a Security Awareness and Training Program That Empowers End Users – Phase 2: Design an Effective Training Delivery Plan

This phase of the blueprint, Develop a Security Awareness and Training Program That Empowers End Users, will help you determine what training methods to use with end users...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us