Security - Storyboard

Build Your Security Operations Program From the Ground Up – Phase 4: Develop an Implementation Roadmap

This phase of the blueprint, Build Your Security Operations From the Ground Up, will help you make your case to the board and develop a roadmap for your prioritized...

Manage Third-Party Service Security Outsourcing – Phase 1: What to Outsource

This phase of the blueprint, Manage Third-Party Service Security Outsourcing,will help you identify different responsibilities and functions in your organization and...

Manage Third-Party Service Security Outsourcing – Phase 2: How to Outsource

This phase of the blueprint, Manage Third-Party Service Security Outsourcing, will help you figure out how you should evaluate third-party service providers.

Reduce and Manage Your Organization's Insider Threat Risk – Phases 1-2

Understand the variety of threats from malicious, accidental, and negligent insiders. Assess security maturity vis-à-vis insider threat. Formally develop an insider...

Reduce and Manage Your Organization's Insider Threat Risk – Phase 1: Understand What Insider Threats Are and Where They Come From

This phase of the blueprint, Reduce and Manage Your Organization's Insider Threat Risk, will help you understand the threats and controls associated with insider threat.

Satisfy Customer Requirements for Information Security – Phase 3: Obtain and Maintain Certification

This phase of the blueprint, Satisfy Customer Requirements for Information Security, will help you determine the scope of your certification, prepare for and pass the...

Develop Necessary Documentation for GDPR Compliance Storyboard

This storyboard will help you get an understanding of the required documentation for GDPR compliance, including a data protection officer job description, data retention...

Implement a Security Governance and Management Program – Phase 2: Develop an Effective Governance Framework

This phase of the blueprint, Implement a Security Governance and Management Program, will help you develop your governance framework.

Build a Data Privacy Program – Phases 1-4

Sell privacy to the business by speaking a language they understand. Take a quantitative approach to integrating privacy within the scope of your organization and build a...

Design and Implement a Vulnerability Management Program – Phase 4: Continually Improve the Vulnerability Management Process

This phase of the blueprint, Design and Implement a Vulnerability Management Program, will help you build upon your established program by measuring its effectiveness and...
GET HELP Contact Us
×
VL Methodology