Infotech

Subscribe to Infotech feed
Published content from Applications & Infrastructure
Updated: 2 hours 34 min ago

Establish a Security Risk Governance Structure

Wed, 16/05/2018 - 05:00
Build a risk governance structure that makes it clear how security risks can be escalated within the organization and who has final decision making on certain risks.

Establish a Security Risk Governance Structure – Executive Brief

Wed, 16/05/2018 - 05:00
Read our concise Executive Brief to find out why you should establish a security risk governance program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

Establish a Security Risk Governance Structure – Phases 1-2

Wed, 16/05/2018 - 05:00
This storyboard will help you present the security risk management program to senior stakeholders, while ensuring that there is a clear escalation path for major risks.

Establish a Security Risk Governance Structure – Phase 1: Define Security Risk Responsibilities

Wed, 16/05/2018 - 05:00
This phase of the blueprint Establish a Security Risk Governance Structure will help you define responsibilities and accountabilities within your security risk management program.

Security Risk Governance Responsibilities and RACI Template

Wed, 16/05/2018 - 05:00
This template will allow you to structure how your risk management groups, including the board of directors and the IT team, will function and own different process areas.

Establish a Security Risk Governance Structure – Phase 2: Build a Security Risk Management Presentation and Report

Wed, 16/05/2018 - 05:00
This phase of the blueprint Establish a Risk Governance Structure will help you report on risk based on the requirements needed within your organization.

Security Risk Management Presentation Template

Wed, 16/05/2018 - 05:00
This template offers a sample presentation of a risk management program, including an overview of the program and major risks.

Security Risk Management Summary Template

Wed, 16/05/2018 - 05:00
This template offers a summary report of a risk management program, including an overview of the program and major risks.

Threat Landscape Briefing – May 2018

Mon, 14/05/2018 - 05:00
This monthly recording covers topics such as cyberthreat trends, nation states, cybercriminals, and hacktivists campaigns, data breaches, control strategies and exposure to vulnerabilities to help you better understand the cyber security impact to business.

LIVE May 2018 Smart Cities

Wed, 09/05/2018 - 05:00
Keynote: Why Cities Shouldn’t Just Be Smart, They Should Be Street Smart

LIVE May 2018 Industry Roundtable Education

Wed, 09/05/2018 - 05:00
Industry Roundtable Education

LIVE May 2018 Industry Roundtable Government

Wed, 09/05/2018 - 05:00
Industry Roundtable Government

LIVE May 2018 Industry Roundtable Manufacturing

Wed, 09/05/2018 - 05:00
Industry Roundtable Manufacturing

LIVE May 2018 Industry Roundtable Professional Services

Wed, 09/05/2018 - 05:00
Industry Roundtable Professional Services

LIVE May 2018 Rapid Fire Sessions Day 3

Wed, 09/05/2018 - 05:00
Rapid Fire Sessions Day 3

LIVE May 2018 Industry Roundtable Financial Services

Wed, 09/05/2018 - 05:00
Industry Roundtable Financial Services

LIVE May 2018 Keynote Prepare for the AI Revolution

Wed, 09/05/2018 - 05:00
Prepare for the AI Revolution

MMS Readiness Assessment Checklist

Wed, 09/05/2018 - 05:00
Use Info-Tech’s MMS Readiness Assessment Checklist to determine whether you have a sufficient foundation and strategy in place to ensure the right application is selected.

MMS Requirements Picklist Tool

Wed, 09/05/2018 - 05:00
Use this tool to collect MMS requirements in alignment with the major functional areas of the MMS.

MMS Selection Executive Presentation Template

Wed, 09/05/2018 - 05:00
Use this presentation template to communicate the MMS vendor selection process and decision to internal stakeholders.