Discover and Classify Your Data – Phases 1-3

This storyboard will help you define and develop your data classification program, from formalizing the program to discovering your data and finally implementing data...

Simplify Identity and Access Management – Phases 1-4

This storyboard will help you lay the groundwork for establishing a centralized, effective, and efficient system for managing identity and access. Simplify your identity...

Information Security Pressure Analysis Tool

Security pressure posture analysis helps your organization assess your real security context and enables you to invest in the right security functions while balancing the...

Develop and Deploy Security Policies – Phases 1-3

This storyboard will help you formalize your security policy program, develop a new policy suite, and implement the program to ensure awareness and engagement from end users.

Threat Landscape Briefing – November 2017

This monthly recording covers topics such as cyberthreat and regulatory trends, nation states, and cyber criminals. This month we look at several topics including the...

Build Your Security Operations Program From the Ground Up – Phase 2: Assess Your Current State

This phase of the blueprint, Build Your Security Operations From the Ground Up, will help you assess the maturity of your prevention, detection, analysis, and response...

Implement and Optimize an Effective Security Management Metrics Program – Phases 1-3

Use this blueprint to initiate a security metrics program, regardless of your organization's maturity level. Once you've started, this research will also help you grow...

CISO Stakeholder Management Strategy Template

Once you have completed the CISO Stakeholder Power Map activity, use this tool to create a strategy to cultivate your stakeholder relationships, and manage each...

Integrate Threat Intelligence Into Your Security Operations – Phase 1: Plan for a Threat Intelligence Program

Assess your organization's unique threat landscape, current capabilities, and define an ideal target state.

Select and Implement a Next Generation Endpoint Protection Solution – Phases 1-3

Endpoint protection is an ever-consolidating market of security controls. Stay up to date; define the endpoint protection strategy and feature set that best aligns with...
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP Contact Us
×
VL Methodology