Security - Solution Sets

Build a Data Privacy Program

Sell privacy to the business by speaking a language they understand. IT and InfoSec leaders need to see privacy as more than just compliance – as a driver of business...
  • guided implementation icon

Tech Trend Update: If Digital Ethics Then Data Equity

The COVID-19 crisis demands solutions, and some technologists might insist it's time to move fast and break things. But building new technologies without digital ethics...

2025 Security Trend Report

To future-proof the CISO, this 2025 Security Trends Report synthesizes input from industry leaders and subjects it to structured scenario analysis using Info-Tech...

Responsibly Resume IT Operations in the Office

As the post-pandemic landscape begins to take shape, ensure that IT can effectively prepare and support your employees as they move back into the office. Once the office...
  • guided implementation icon

Cybersecurity Priorities in Times of Pandemic

The recent events around COVID-19 have been unprecedented, and organizations have taken measures to maintain business continuity. Security can never be an afterthought,...

Ensure Your Pandemic Response Plan Is Privacy-Proof

Don't let panic negate the need for privacy best practices. Keep privacy at the core of your pandemic response plan and build a program that is time sensitive, scalable,...

Reinforce End-User Security Awareness During Your COVID-19 Response

With the COVID-19 pandemic forcing many businesses to start operating remotely, security is often the first to suffer. Start a training program for employees on how to...

Build Your Security Operations Program From the Ground Up

Use this blueprint to establish your security operations program with a threat collaboration environment.
  • guided implementation icon

Create a Disaster-Ready Ransomware Recovery Plan

Organizations don’t always integrate their incident response and disaster recovery plans, which creates gaps in their response strategy to ransomware – this can...
  • guided implementation icon

2020 Security Priorities Report

Use this deck to learn what projects security practitioners are prioritizing for 2020.
  • guided implementation icon
GET HELP Contact Us
×
VL Methodology