User Data Handling Requirements Tool

This tool will help you organize the data handling requirements for users throughout each phase of data's lifecycle.

Subject Access Request (SAR) Procedure

Use this template to build procedures for subject access requests.

Debunk Machine Learning Endpoint Security Solutions – Phases 1-2

This storyboard will help you gain awareness of how machine learning is being leveraged in endpoint security.

Operations Security Policy – ISO

The purpose of this policy is to ensure the secure operations of information processing facilities within and related to an organization.

Employee Monitoring Policy – Employee-Facing

Policy notifying employees of any monitoring that takes place on the systems they use.

CISO Core Competency Evaluation Tool

Use this tool to identify which competencies are most important to your organization, and what your current proficiency is in each competency.

Develop Your Security Outsourcing Strategy – Phases 1-3

This storyboard will help you decide which security responsibilities/functions you can outsource, select a managed security service provider (MSSP), and finally, manage...

Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 2: Identify Your Cloud Security Requirements

This phase of the blueprint, Ensure Cloud Security in IaaS, PaaS, and SaaS Environments, will help you use the Cloud Security CAGI Tool to perform four unique assessments...

Security Incident Management Runbook: Third-Party Incident

Use this template to help you develop an incident-specific runbook and accompanying workflows.

Select and Implement a Next Generation Endpoint Protection Solution – Executive Brief

Read our Executive Brief to understand why you should consider a next generation endpoint protection solution.
GET HELP Contact Us
×
VL Methodology