Security - Tools

Business Requirement Security Strategy Mapping Tool

Use this tool to map business and IT initiatives to specific security mitigation controls. This tool is a documentation and mapping support tool as part of your larger...

Internal Controls Prioritization Tool

This tool will give you an assessment of your current control coverage and help you determine the types of controls required to mitigate your risks.

Internal Controls Effectiveness Scorecard

The only way to know if your controls are providing adequate coverage is to measure them over time. This tool will give you insight into the continued relevance of your...

Risk Tolerance Determination Tool

This tool helps you determine risk tolerance level to guide future assessments and accurately identify unacceptable risks.

Security Process and Technology Assessment Tool

Use this tool to create a comprehensive, high-level view of your information security process and technology maturity.

Vendor Security Questionnaire

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to develop a questionnaire for potential vendors to assess their...

Vendor Security Assessment Inventory

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to inventory vendors and the results of their security assessments.

Concept of Operations Maturity Assessment Tool

The Concept of Operations Maturity Assessment Tool will help you systematically understand your current security state. Based on Info-Tech's maturity model, evaluate the...

Security Operations RACI Chart & Program Plan

Assign responsibilities and develop collaborative process flows for the security operations program.

Insourcing vs. Outsourcing Costing Tool

This tool will help you determine the costs of outsourcing and in-house options to determine potential cost savings from outsourcing.
GET HELP Contact Us
×
VL Methodology