Security - Storyboard

Simplify Identity and Access Management – Phase 3: Create an RBAC Maintenance Plan

This phase of the blueprint Simplify Identity and Access Management covers best practices regarding exception handling and maintaining the RBAC system over time.

Select and Implement a SIEM Solution – Phases 1-3

Security Information and Event Management (SIEM) technology provides a great deal of visibility into an organization's networks and can identify extremely sophisticated...

Develop Foundational Security Operations Processes – Phases 1-3

Threat management has become resource-intensive, requiring continuous monitoring, collection, and analysis of significant volumes of event data. Implement a...

Develop Foundational Security Operations Processes – Phase 1: Assess Your Current State

Assess current prevention, detection, analysis, and response capabilities.

Build an Information Security Strategy – Phase 1: Assess Requirements

This phase of the blueprint, Build an Information Security Strategy, will help you bring your security program into alignment with the organization.

Build, Optimize, and Present a Risk-Based Security Budget – Phase 1: Review Requirements for the Budget

This phase of the blueprint, Build, Optimize, and Present a Risk-Based Security Budget, will help you gather the requirements needed and review them to ensure you can...

Discover and Classify Your Data – Phase 2: Discover the Data

This phase of the blueprint will help you perform and manage data discovery.

Select and Implement an Intrusion Detection and Prevention System – Phase 2: Analyze IDPS Requirements and Shortlist Vendors

Identify the requirements for your IDPS. ​Produce your vendor shortlist.

Optimize Security Mitigation Effectiveness Using STRIDE – Phases 1-6

Use Info-Tech's unique and powerful process to assess your organization's threat landscape and security controls to create an insightful and actionable plan to optimize...

Fast Track Your GDPR Compliance Efforts – Phase 2: Define Your GDPR Scope

This phase of the blueprint, Fast Track Your GDPR Compliance Efforts, will help you understand the areas of your organization that are top priority for compliance.
GET HELP Contact Us
×
VL Methodology