Security - Storyboard

Satisfy Customer Requirements for Information Security – Phases 1-3

This storyboard will help you satisfy customer requirements for information security and determine if SOC 2 or ISO 27001 certification is right for you.

Satisfy Customer Requirements for Information Security – Phase 1: Manage Customer Expectations for Information Security

This phase of the blueprint, Satisfy Customer Requirements for Information Security, will help you understand customer expectations for information security and build a...

Satisfy Customer Requirements for Information Security – Phase 2: Select a Certification Path

This phase of the blueprint, Satisfy Customer Requirements for Information Security, will help you understand your options for obtaining a security certification and...

Satisfy Customer Requirements for Information Security – Phase 3: Obtain and Maintain Certification

This phase of the blueprint, Satisfy Customer Requirements for Information Security, will help you determine the scope of your certification, prepare for and pass the...

Comply With the California Consumer Privacy Act Storyboard

This storyboard will help you tackle CCPA compliance.

Comply With the California Consumer Privacy Act – Phase 1: Create a Subject Access Request (SAR) Process

This phase of the blueprint, Comply with the California Consumer Privacy Act, will help you create a subject access request process.

Develop and Implement a Security Incident Management Program – Phases 1-3

Effective and efficient management of incidents involves a formal process of preparation, detection, analysis, containment, eradication, recovery, and post-incident...

Develop and Implement a Security Incident Management Program – Phase 1: Prepare

Prepare your organization for incident response with formal documentation of policies and processes, and a list of prioritized incidents.

Develop and Implement a Security Incident Management Program – Phase 2: Operate

Operate with efficiency and effectiveness as new incidents are handled.

Develop and Implement a Security Incident Management Program – Phase 3: Maintain and Optimize

Maintain and optimize the incident management process by tracking metrics, performing tabletop exercises, and leveraging best practices.
GET HELP Contact Us
×
VL Methodology