Security - Tools

Security Certification Selection Tool

Use this tool to determine whether your organization should consider SOC 2 or ISO 27001 certification to help manage customer expectations for information security.

Security Certification Business Case Tool

Use this tool to help build a business case for obtaining an information security certification such as SOC 2 or ISO 27001.

Subject Access Request (SAR) Registry Tool

Use this tool as a starting point to track all types of subject access requests throughout the process.

Security Incident Metrics Tool

Identify relevant metrics to assist in evaluating the success of your organization's incident response processes.

Security Incident Runbook Prioritization Tool

Prioritize the order in which the security incident runbooks will be developed based on the frequency and the impact of the potential incidents.

Security Incident Management RACI Tool

Assign responsibilities and deadlines for incident response and the management process.

Post-Incident Review Questions Tracking Tool

Use this template to help you determine the key questions that need to be answered at your post-incident review.

Security Incident Management Maturity Checklist ‒ Preliminary

Use this tool to help you quickly gauge your organization's current security incident management processes.

User Data Handling Requirements Tool

This tool will help you organize the data handling requirements for users throughout each phase of data's lifecycle.

Data Classification Verification Tool

This tool will help you verify the classification levels of your data by ensuring a balance of protection for sensitive data with limited cost and user friction.
GET HELP Contact Us
×
VL Methodology