Satisfy Customer Requirements for Information Security Research & Tools
Start here – read the Executive Brief
Read our concise Executive Brief to find out why you should proactively satisfy customer requirements for information security, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
1. Manage customer expectations for information security
Identify
your customers’ expectations for security and privacy, value rank your
customers to right-size your efforts, and learn how to impress them with your
information security program.
- Satisfy Customer Requirements for Information Security – Phase 1: Manage Customer Expectations for Information Security
2. Select a certification path
Decide
whether to obtain SOC 2 or ISO 27001 certification, and build a business case
for certification.
- Satisfy Customer Requirements for Information Security – Phase 2: Select a Certification Path
- Security Certification Selection Tool
- Security Certification Business Case Tool
3. Obtain and maintain certification
Develop
your certification scope, prepare for the audit, and learn how to maintain your
certification over time.