Published content from Applications & Infrastructure
Updated: 2 hours 34 min ago
Build a risk governance structure that makes it clear how security risks can be escalated within the organization and who has final decision making on certain risks.
Read our concise Executive Brief to find out why you should establish a security risk governance program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.
This storyboard will help you present the security risk management program to senior stakeholders, while ensuring that there is a clear escalation path for major risks.
This phase of the blueprint Establish a Security Risk Governance Structure will help you define responsibilities and accountabilities within your security risk management program.
This template will allow you to structure how your risk management groups, including the board of directors and the IT team, will function and own different process areas.
Establish a Security Risk Governance Structure – Phase 2: Build a Security Risk Management Presentation and Report
This phase of the blueprint Establish a Risk Governance Structure will help you report on risk based on the requirements needed within your organization.
This template offers a sample presentation of a risk management program, including an overview of the program and major risks.
This template offers a summary report of a risk management program, including an overview of the program and major risks.
This monthly recording covers topics such as cyberthreat trends, nation states, cybercriminals, and hacktivists campaigns, data breaches, control strategies and exposure to vulnerabilities to help you better understand the cyber security impact to business.
Keynote: Why Cities Shouldn’t Just Be Smart, They Should Be Street Smart
Industry Roundtable Education
Industry Roundtable Government
Industry Roundtable Manufacturing
Industry Roundtable Professional Services
Rapid Fire Sessions Day 3
Industry Roundtable Financial Services
Prepare for the AI Revolution
Use Info-Tech’s MMS Readiness Assessment Checklist to determine whether you have a sufficient foundation and strategy in place to ensure the right application is selected.
Use this tool to collect MMS requirements in alignment with the major functional areas of the MMS.
Use this presentation template to communicate the MMS vendor selection process and decision to internal stakeholders.