Generate an exhaustive customized list of security controls to implement in your IT projects in a lightweight format. Project managers can use it to follow-up the security workstream in their projects, allocate tasks to the security custodians and document the implementation status of each individual control. Results can be imported back to ISDPTool and taken into account for residual risk evaluation and corporate risk management purpose.
Our team will get back to you as soon as possible