Unlock Tool

Speak With A Representative

Info-Tech Research Group
  • Home
  • What We Do
  • Customer Reviews
  • Events & Webinars
  • Pricing
  • 4 3 2 More
    • What We Do
    • Customer Reviews
    • Events & Webinars
    • Pricing
  • View Member Site
  • Request a Demo
Sign In
Info-Tech Research Group
MENUCLOSE
  • Home
  • What We Do
  • Customer Reviews
  • Events & Webinars
  • Pricing
  • +1-888-670-8889
  • View Member Site
  • Request a Demo
    • Sign In
  • Technology Research
  • Industry Categories
  • Government - Federal & Defense

Security Governance & Management Model Tool for Government

Access this content by contacting one of our representatives for assistance.

Author(s): Neal Rosenblatt

This tool will help you determine governance and management accountabilities and responsibilities and use them to build a visual governance and management model.


Tags

cyber security, cybersecurity, grc cyber security, grc security, cybersecurity governance, security governance, government cybersecurity, what is grc in it security, cyber governance, it security governance, security management, policy exceptions, exceptions handling, risk appetite, risk tolerance, key performance indicators, security KPIs, security metrics, security accountabilities, security responsibilities, steering committee, whole of government, cybersecurity integration
Share on Social

Select Social Platform:

Share on Twitter Share on LinkedIn

Related Content: Industry Categories

Thought model representing Security Policy Exception Approval Workflow for Government

Security Policy Exception Approval Workflow for Government

Thought model representing Policy Exception Tracker for Government

Policy Exception Tracker for Government

Thought model representing Security Policy Exception Request Form for Government

Security Policy Exception Request Form for Government

Thought model representing Security Policy Lifecycle Template for Government

Security Policy Lifecycle Template for Government

Thought model representing Embed Security Into the DevOps Pipeline

Embed Security Into the DevOps Pipeline

View all Related Content
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171

Want
Measurable
Results?

Let us show you how.
Join over 30,000 members
worldwide using our research.

Become a Member

Company

  • About Us
  • Careers
  • Newsroom
  •  
  • Usage & Citation
  • Terms of Use
  • Privacy Policy
  • Modern Slavery Statement

Partner With Us

  • Partners
  • LIVE Media Kit

How We Deliver

  • Do-It-Yourself
  • Over the Phone
  • Onsite
  • Consulting

Member Resources

  • Browse Research

Become a Member

  • Become a Member

Certifications

  • American Institute of Chartered Professional Accountants’ Service Organization Controls (SOC) certification
  • National Cyber Security Centre’s Cyber Essentials certification
  • The PwC certification seal

Call Us Today

North America

+1-888-670-8889

International

+1-703-340-1171 Contact Us
itrg hash mark
© Info-Tech Research Group | Terms of Use | Privacy Policy

Please confirm the appointment time and click Schedule.

### DATE START ###

New

Info-Tech, McLean & Company, and SoftwareReviews are introducing single sign-on.

  • Use your current credentials to sign in on the next page.
  • If you have one membership, nothing will change for you - just sign in as usual.
  • If you have more than one membership, the account email and password you use the first time will be applied to every membership.

Sites included

  • Info-Tech Research Group
  • McLean & Company
  • McLean 360 Feedback
  • McLean Connect
  • McLean EXM
  • SoftwareReviews Vendor Portal