Security - Solution Sets

Create a Disaster-Ready Ransomware Recovery Plan

Organizations don’t always integrate their incident response and disaster recovery plans, which creates gaps in their response strategy to ransomware – this can...
  • guided implementation icon

2020 Security Priorities Report

Use this deck to learn what projects security practitioners are prioritizing for 2020.
  • guided implementation icon

Demonstrate Data Protection by Design for IT Systems

Privacy is now considered an integral part of information security. In fact, consumers often want more than a company’s word that their data is secure; they want to see...
  • guided implementation icon

Time Study

Info-Tech Research Group conducted a research project that focused on the time management practices of cybersecurity professionals. The report was based on the responses...

Develop a Security Awareness and Training Program That Empowers End Users

Cyberattackers target your end users, who remain today’s weakest link in organizational security. Design and deliver an effective and up-to-date training program to...
  • guided implementation icon

Satisfy Customer Requirements for Information Security

Your customers and potential customers are increasingly demanding assurance that you will meet their information security requirements. Discover best practices for...
  • guided implementation icon

Comply With the California Consumer Privacy Act

This project covers the major commonalities of GDPR and CCPA.
  • guided implementation icon

Develop and Implement a Security Incident Management Program

Security incidents are inevitable, but how they’re dealt with can make or break an organization. Poor incident response negatively affects business practices, including...
  • guided implementation icon

Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan

The cybersecurity skills gap is an ever-growing challenge that all organizations will eventually face. To circumvent the problem, actively plan for the shortage by...
  • guided implementation icon

Ensure Cloud Security in IaaS, PaaS, and SaaS Environments

This blueprint will comprehensively evaluate your hosted cloud risk profile to determine what unique security controls your organization requires to secure its cloud...
  • guided implementation icon
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP Contact Us
×
VL Methodology