Optimize Security Mitigation Effectiveness Using STRIDE

Your perception of how well you are protected is only as good as the information you collect, and many organizations struggle with collecting the right information....
  • guided implementation icon

Manage Third-Party Service Security Outsourcing – Phase 3: Manage Your Third-Party Provider

This phase of the blueprint, Manage Third-Party Service Security Outsourcing, will help you understand how to align third-party providers to your organization.

Optimize Security Mitigation Effectiveness Using STRIDE – Phase 5: Outputs and Interpretation

This phase of the blueprint, Optimize Security Mitigation Effectiveness, will help you to understand and interpret the results of the assessment and gain insight into how...

Operations Security Policy – ISO

The purpose of this policy is to ensure the secure operations of information processing facilities within and related to an organization.

Be More Secure Without Passwords: Microsoft Embraces Passwordless Authentication and FIDO2

Microsoft is working to usher in the era of passwordless multi-factor authentication as passwordless API becomes an official W3C standard. Strong authentication using...

Leverage Threat Intelligence for Your Organization in Five Steps

These five steps will take you through what you need to know to use threat intelligence to improve your organization’s overall security, no matter what your level of...

Fast Track Your GDPR Compliance Efforts – Phase 4: Align Your Data Breach Requirements & Security Program

This phase of the blueprint, Fast Track Your GDPR Compliance Efforts, will aid in aligning privacy and information security.

Hire or Develop a World-Class CISO – Phase 1: Launch

Understand the core competencies required to be a successful world-class CISO, and identify which ones are a priority for you.

Implement a Security Governance and Management Program – Phase 2: Develop an Effective Governance Framework

This phase of the blueprint, Implement a Security Governance and Management Program, will help you develop your governance framework.

Design and Implement a Vulnerability Management Program – Phase 2: Triage Vulnerabilities and Assign Urgencies

This phase of the blueprint, Design and Implement a Vulnerability Management Program, will help you identify how urgent different vulnerabilities are based on their...
GET HELP Contact Us
×
VL Methodology