91ÖÆÆ¬³§

Tagged - Security Governance

Introduction Sheet

Use Info-Tech's Introduction Sheet to create a short communication memo to send to your colleagues on your first day.

The First 100 Days as CISO – Phases 1-5

Your first 100 days are the ultimate predictor of your long-term success. Make it count by following Info-Tech's five-step approach.

The First 100 Days as CISO – Executive Brief

Read this Executive Brief to understand Info-Tech's five-step approach to conquering your first 100 days as a CISO.

The First 100 Days as CISO

Your first 100 days are the ultimate predictor of your long-term success. Make it count by following Info-Tech's five-step approach.
  • guided implementation icon

Webinar: Create a Business-Aligned Information Security Strategy

Organizations need security programs that are holistic, risk-aware, and business-aligned. Watch this webinar to learn how to create a successful security strategy.

Security Policy Exception Approval Workflow

Use this workflow to help you formalize and document your policy exception approval process.

Information Security Policy Exception Request Form

Use this template as a means to request and approve proposed exceptions to your security policies.

Policy Exception Tracker

Use this tool to help you track ongoing exceptions to your security policies.

Security Governance and Management Challenge Analysis Tool

Use this tool to help you organize and prioritize your current security governance and management challenges.

Security Governance and Management Communication Plan

This template will help you organize your various security communication efforts with different stakeholders.
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us