Security - Tools

Cybersecurity Priorities Checklist Tool

This tool will help you filter out controls from a predefined list of primary, secondary, and tertiary priority domains and help you visualize a final list of initiatives...

Data Process Mapping Tool Lite

Use the Data Process Mapping Tool Lite to map out the flow of personal data. Apply your privacy framework to new and/or temporary business processes involving personal...

Security Operations Roadmap Tool

This tool will help you systematically understand your current security state. This tool will show your perceived and actual level and your most and least mature security...

In-House vs. Outsourcing Decision-Making Tool

The In-House vs. Outsourcing Decision-Making Tool is designed to help organizations analyze the cost and risk management effectiveness for security capabilities with...

Security Operations RACI Tool

Assign responsibilities for the security operations process.

Ransomware Incident Management Maturity Assessment Tool

Use the Ransomware Incident Management Maturity Assessment Tool to define your current and target state, create gap initiatives to close the gap, and prioritize...

Data Protection by Design Matrix

Use this matrix to track DPbD best practices across your IT systems, business processes, and application development.

Data Protection by Design IT Systems Record

Use this matrix to record the specific DPbD controls your organization is using to ensure data privacy across IT systems.

Security Awareness and Training Program Development Tool

This tool will help you identify initiatives to develop your security awareness and training program. The tool focuses on four areas of initiatives: the fundamentals,...

Security Awareness and Training Metrics Tool

This tool will help you identify and select metrics for measuring the success of your security awareness and training program.
GET HELP Contact Us
×
VL Methodology