Security - Storyboard

Simplify Identity and Access Management – Phase 3: Create an RBAC Maintenance Plan

This phase of the blueprint Simplify Identity and Access Management covers best practices regarding exception handling and maintaining the RBAC system over time.

Build Your Security Operations Program From the Ground Up – Phases 1-4

Use this blueprint to establish your security operations program with a threat collaboration environment.

Build Your Security Operations Program From the Ground Up – Phase 1: Establish Your Foundation

This phase of the blueprint, Build Your Security Operations From the Ground Up, will help you determine how to establish the foundation of your security operations.

Build an Information Security Strategy – Phase 1: Assess Requirements

This phase of the blueprint, Build an Information Security Strategy, will help you bring your security program into alignment with the organization.

Select and Implement A Next Generation Endpoint Protection Solution – Phase 1: Create an Effective Endpoint Protection Strategy

Assess the use-case and corresponding feature-set that best aligns with the organizational landscape.

Select and Implement a Next Generation Endpoint Protection Solution – Phase 2: Select an Endpoint Protection Solution

Streamline the endpoint procurement process by identifying the vendor that best satisfies the use-case criteria.

Develop a Security Awareness and Training Program That Empowers End Users – Phases 1-2

This storyboard will help you develop a security awareness and training program, which includes building a formal awareness and training program to elevate the security...

Select and Implement a Next Generation Endpoint Protection Solution – Phase 3: Implement and Manage Your Endpoint Protection Solution

Prepare for the EPP implementation and measure the value of the solution.

Develop a Security Awareness and Training Program That Empowers End Users – Phase 1: Develop Your Training Program

This phase of the blueprint, Develop a Security Awareness and Training Program That Empowers End Users, will help you build a development plan for your program, as well...

Improve Security Governance With a Security Steering Committee – Phases 1-3

This storyboard will help you set up your steering committee and identify the key players, their responsibilities and the capabilities of your committee.
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP Contact Us
×
VL Methodology