CIO - Storyboard

Create an IT View of the Service Catalog – Phase 4: Determine People & Process

This phase of the blueprint will introduce a method for determining roles and responsibilities required to support user-facing services. It will also help with...

Reduce IT Spend at Small Enterprise Organizations Storyboard

Cost control is a necessary part of effective IT governance. It’s also a smart general business practice. Use the research to identify cost cutting initiatives and...

Comply with the Security Requirements of HIPAA or SOX – Phases 1-3

This storyboard will walk you through the management of security compliance in regards to HIPAA and SOX. It will define gaps, and create an actionable roadmap to assist...

Comply with the Security Requirements of HIPAA or SOX – Phase 1: Assess Current State

The first phase of this project will walk through identifying and defining your compliance obligations. It will then move through a current state assessment of the...

Comply with the Security Requirements of HIPAA or SOX – Phase 2: Perform a Gap Analysis

This phase will allow you to identify any existing gaps and create gap initiatives to close your security compliance requirements in HIPAA and/or SOX.

Comply with the Security Requirements of HIPAA or SOX – Phase 3: Build a Roadmap

This phase will assist in prioritizing compliance gap initiatives, and then creating an actionable roadmap to close any security compliance requirements in HIPAA and/or SOX.

Build an IT Risk Management Program – Phases 1-3

Risk is an unavoidable part of IT. And what you don't know, CAN hurt you. The question is, do you tackle risk head-on or leave it to chance? Get a handle on risk...

Build a Business-Driven IT Risk Management Program – Phase 1: Review IT Risk Fundamentals and Governance

Review the foundations of IT risk management and establish a robust governance framework.

Build a Business-Driven IT Risk Management Program – Phase 2: Identify and Assess IT Risk

Identify and assess IT's greatest risks.

Build a Business-Driven IT Risk Management Program – Phase 3: Monitor, Communicate, and Respond to IT Risk

Establish monitoring responsibilities, develop risk responses, and communicate your risk priorities to the business.
GET HELP Contact Us
×
VL Methodology