Identify Opportunities to Mature the Security Architecture – Executive Brief

Discover why every organization needs an appropriate security architecture. Review how this blueprint will assist with the development of a right-sized security...

Vivvo Delivers E-Services Platform CitizenOne

Canadian-based technology company Vivvo eyes government services as it launches e-services platform, CitizenOne.

Ayehu Bridges Gap Between IT Ops and Sec Ops

Ayehu is working to bridge the gap between IT Operations and Security Operations. We expect to see more vendor product offerings follow suit.

GDPR Initiative Prioritization Tool

To enable effective execution of compliance, GDPR initiatives should be evaluated and prioritized.

Tripwire’s Managed Services Now Include Vulnerability Management

Tripwire’s vulnerability management solution is now offered as-a-Service, as part of its managed Security-as-a-Service offering, ExpertOps.

Data Protection Impact Assessment Tool

To enable effective execution of compliance to the GDPR, a Data Protection Impact Assessment should be completed for processing activities that put data subjects at risk.

Build a Privacy Program – Phases 1-3

This storyboard will help you understand why a privacy program is necessary for any organization and walk you through the steps to implement a plan accordingly.

Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 4: Implement Your Secure Cloud Program

This phase of the blueprint, Ensure Cloud Security in IaaS, PaaS, and SaaS Environments, will help you turn your security requirements into specific tasks and develop...

Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan – Phases 1-3

This storyboard will help you to take a proactive approach to identifying the needed technical skills for your future environment and to systematically decide how to...

Data Breach Reporting Requirements Summary

Use this template to help keep track of your regulatory reporting requirements following a data breach.
GET HELP Contact Us
VL Methodology