Security - Storyboard

Close the InfoSec Skills Gap: Develop a Skills Sourcing Plan for Future Work Roles – Phase 3: Develop a Sourcing Plan for Future Work Roles

This phase of the blueprint will help you decide how to acquire skills.

Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan – Phases 1-3

This storyboard will help you to take a proactive approach to identifying the needed technical skills for your future environment and to systematically decide how to...

Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan – Phase 1: Identity Skill Needs for Target State

This phase of the blueprint will help you define your security initiative skill needs.

Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan – Phase 2: Identify Technical Skill Gaps

This phase of the blueprint will help you align role requirements with future initiative skill needs.

Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phases 1-5

This blueprint will comprehensively evaluate your hosted cloud risk profile to determine what unique security controls your organization requires to secure its cloud...

Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 1: Determine Your Cloud Risk Profile

This phase of the blueprint, Ensure Cloud Security in IaaS, PaaS, and SaaS Environments, will help you determine your organization’s rationale for cloud adoption and what...

Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 2: Identify Your Cloud Security Requirements

This phase of the blueprint, Ensure Cloud Security in IaaS, PaaS, and SaaS Environments, will help you use the Cloud Security CAGI Tool to perform four unique assessments...

Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 3: Evaluate Vendors From a Security Perspective

This phase of the blueprint, Ensure Cloud Security in IaaS, PaaS, and SaaS Environments, will help you learn how to assess and communicate with cloud vendors with...

Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 4: Implement Your Secure Cloud Program

This phase of the blueprint, Ensure Cloud Security in IaaS, PaaS, and SaaS Environments, will help you turn your security requirements into specific tasks and develop...

Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 5: Build a Cloud Security Governance Program

This phase of the blueprint, Ensure Cloud Security in IaaS, PaaS, and SaaS Environments, will help you build the organizational structure of your cloud security...
GET HELP Contact Us
×
VL Methodology