Build a Service-Based Security Resourcing Plan

The blueprint will help you to define your security roles, service offerings, estimate service demand, and determine required FTEs.
  • guided implementation icon

Build an Effective Data Retention Program

This research will help you to determine data retention requirements, create a retention schedule, identify at-risk data, and manage manual data deletion.
  • guided implementation icon

Build an Effective Data Retention Program – Phases 1-3

Implement data retention and find the data types that carry the most retention-related risk.

Data Retention Schedule and Risk Identification Tool

Use this tool to determine your data retention schedule as well as high-risk data types and repositories

Data Retention RACI Tool

Complete this RACI matrix to determine your data retention roles and responsibilities.

Threat Landscape Briefing – August 2022

This monthly recording covers topics such as cyber threat and regulatory trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control...

Build a Security Compliance Program

Mastering a cost-effective approach to cybersecurity and data protection compliance can provide organizations with a clear strategic advantage. Take control of your...
  • guided implementation icon

Zero Trust Protect Surface Mapping Tool

Use this tool to identify key protect surfaces and map them to business goals.

Build a Zero Trust Roadmap – Phases 1-5

Use this storyboard to better understand the steps involved in building a roadmap for implementing zero trust.

Zero Trust Communication Deck

Use this template to present the zero trust strategy and roadmap to key stakeholders.
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us