Use this tool to track and classify corporate data. Gain insight on the location and security of various data and repositories to drive strategic security decisions.
|
|
Here are nine email templates that can be used to educate end users on best practices. These pre-populated training materials can be customized to include any...
|
|
Use Info-Tech's Maintenance Policy to define how system maintenance procedures will operate.
|
|
In security circles, it has long been a poorly kept secret that the tools of the time - firewalls, antivirus, and malware protection - were what scientists would call...
|
|
A couple of years ago, I was asked to give a keynote talk to the highly secretive National Geospatial-Intelligence Agency (NGA), at its annual Global 91ÖÆÆ¬³§ and...
|
|
Use this tool to identify which competencies are most important to your organization, and what your current proficiency is in each competency.
|
|
Once you have completed the CISO Stakeholder Power Map activity, use this tool to create a strategy to cultivate your stakeholder relationships, and manage each...
|
|
Once you have assessed your competency, process, and technology gaps, use this tool to set goals and create an action plan to remediate any gaps.
|
|
The data center access policy will outline the standards for regulating access to the company data center(s).
|
|
Physical access controls define who is allowed physical access to facilities that house information systems, and to the information systems within those facilities and/or...
|
|