Security - Storyboard

Build a Vendor Security Assessment Service – Phase 2: Develop Assessment Methodology

This phase of the blueprint, Build a Vendor Security Assessment Service, will help you develop procedures and tools to assess vendor risk.

Build a Vendor Security Assessment Service – Phase 3: Deploy and Monitor Process

This phase of the blueprint, Build a Vendor Security Assessment Service, will help you implement the process and develop metrics to measure effectiveness.

Build a Data Privacy Program – Phase 2: Conduct a Privacy Gap Analysis

This phase of the blueprint, Build a Data Privacy Program, will help you to understand the current state of privacy, identify the target state, and develop gap-closing...

Build a Data Privacy Program – Phase 3: Build the Privacy Roadmap

This phase of the blueprint, Build a Data Privacy Program, will help you to prioritize initiatives based on a collective score that takes into account cost, effort,...

Embed Security Into the DevOps Pipeline – Phases 1-2

This storyboard will help you transcend traditional application security approaches and embrace the agile mindset to shift security left towards DevSecOps.

Embed Security Into the DevOps Pipeline – Phase 1: Identify Opportunities

This phase of the blueprint, Embed Security Into the DevOps Pipeline, will help you brainstorm potential opportunities for securing DevOps.

Embed Security Into the DevOps Pipeline – Phase 2: Develop Strategy

This phase of the blueprint, Embed Security Into the DevOps Pipeline, will help you develop an implementation strategy for getting to DevSecOps.

Assess and Manage Security Risks – Phases 1-4

Use this blueprint to lay down the foundations for security risk management, including governance, assessment, and risk treatment.

Combine Security Risk Management Components Into One Program – Phase 1: Establish the Risk Environment

This phase of the blueprint will help you define responsibilities and accountabilities within your security risk management program and an organizational risk tolerance level.

Combine Security Risk Management Components Into One Program – Phase 2: Conduct Threat and Risk Assessments

This phase of the blueprint will help you develop a methodology for conducting threat and risk assessments across any project or initiative across the IT department.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us