|
Use these definitions as a starting point to develop an IT risk taxonomy appropriate for your organization.
|
|
|
Use this template as a reference to design an IT risk taxonomy to suit your organization’s needs, starting with level 1 and working down.
|
|
|
The pace and uncertainty in the current business environment introduces new and emerging vulnerabilities that can disrupt an organization’s strategy on short notice....
|
|
|
With the demand for digital capabilities and experiences increasing, the need for real-time risk management has never been greater. Follow this step-by-step process to...
|
|
|
Use this charter template to create a cross-functional IT risk taxonomy committee.
|
|
|
Yesterday, Vector Institute gave a webinar on “Using AI to guide re-opening of workplaces in the wake of COVID-19.” Can AI truly help? Read on to find out.
|
|
|
Once you've identified IT's supporting tasks, it's time to prioritize. This phase walks through the activity of prioritizing based on cost/effort, alignment to business,...
|
|
|
Read this Executive Brief to understand why a highly mature security risk management program can help inform your overall security program.
|
|
|
This phase of the blueprint will help you define responsibilities and accountabilities within your security risk management program and an organizational risk tolerance level.
|
|
|
This phase of the blueprint will help you develop a methodology for conducting threat and risk assessments across any project or initiative across the IT department.
|
|