Ingram Micro's
Security Practice Development Program
Ingram Micro’s Security Practice Builder is designed to help your organization create, improve or expand its position in a market place that is transforming at unprecedented levels. The Security Practice Builder focuses on key technology components of security solutions aligned closely to the NIST framework: IDENTIFY, PROTECT, DETECT, RESPOND, RECOVER. The multi-step approach to the program, as indicated below, will help you and your company build a strong foundation with focus applied precisely to the areas you've identified as needs.
Step 1 - Self-AssessmentSound practice building initiatives start with two primary objectives: A review of the elements that make up a successful practice and an assessment of how well your company stacks up to current best practices. By completing the self-assessment tab within you'll achieve both goals. Upon completion of the self-assessment you'll be presented with a report card to use as a guide in subsequent steps.
Step 2 - Calibration/Goal-SettingIngram Micro’s consultants and services experts will meet with your company’s Security practice stakeholders to review the responses indicated by the report card. This is a calibration exercise which will add clarity for all involved and accelerate the progress toward transforming your business regarding security services & solutions. Once the calibration is complete, we will outline a plan and create a prioritized list of goals and objectives you'd like to achieve. Agreed upon development objectives will be highlighted and mapped to specific and relevant modules in the ensuing program curriculum.
Step 3 - Path to SuccessStep 3 focuses on education, collaboration and partnership building relevant to the business plan established in Step 2. Throughout the curriculum you will be presented a series of training modules to help you establish foundational knowledge and skills. You will also meet 1 on 1 with a consultant who will answer any questions you have and review your progress. Upon completion of Step 3 you will be better prepared to “Go-to-Market” with your clients regarding Security solutions and services.
|
|