Security - Solution Sets

Reduce and Manage Your Organization’s Insider Threat Risk

The hard digital wall has crumbled. The focus of organizations has been to protect themselves from the outside, but they equally need to assess and protect themselves...
  • guided implementation icon

Debunk Machine Learning Endpoint Security Solutions

Traditional legacy anti-virus solutions are unable to keep up with the sheer volume of new and sophisticated endpoint attacks. As a potential solution to combat this...
  • guided implementation icon

Combine Security Risk Management Components Into One Program

IT departments are tasked with implementing new projects, but are often unsure how to assess the risk. Often, they use informal discussions that do not allow the business...
  • guided implementation icon

Embed Security Into the DevOps Pipeline

Transcend traditional application security approaches and embrace the agile mindset to shift security left. Use innovation and automation to secure the DevOps pipeline...
  • guided implementation icon

Dive Into Five Years of Security Strategies

Since 2013, Info-Tech’s “Build an Information Security Strategy” research has been used to help our members build their security programs. Using our own Security...

Develop Necessary Documentation for GDPR Compliance

Understand your GDPR requirements concerning your data protection officer, retention requirements, and privacy and cookie policies. Use this blueprint to customize...

Build a Vendor Security Assessment Service

Risks from third parties are on the rise, but many organizations still struggle with how to tackle this problem. A risk-based approach is needed to manage supply chain...
  • guided implementation icon

Improve Security Governance With a Security Steering Committee

Successful information security governance requires a venue to address security concerns with participation across the entire business. Without access to requisite...
  • guided implementation icon

Master Your Security Incident Response Communications Program

Many organizations do not have an incident response plan, and those that do often forget to include a communications plan, leading to time loss while trying to create one...
  • guided implementation icon

Simplify Identity and Access Management

This research will lay the groundwork for establishing a centralized, effective, and efficient system for managing identity and access. We will help organizations take...
  • guided implementation icon
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP Contact Us
×
VL Methodology