Identify Opportunities to Mature the Security Architecture – Executive Brief

Discover why every organization needs an appropriate security architecture. Review how this blueprint will assist with the development of a right-sized security...

Manage Third-Party Service Security Outsourcing – Phase 1: What to Outsource

This phase of the blueprint, Manage Third-Party Service Security Outsourcing,will help you identify different responsibilities and functions in your organization and...

Manage Third-Party Service Security Outsourcing

A lack of time and resources prevent many CISOs and organizations from being able to enable security services and deliver them internally. In addition, there is not...
  • guided implementation icon

Vivvo Delivers E-Services Platform CitizenOne

Canadian-based technology company Vivvo eyes government services as it launches e-services platform, CitizenOne.

GDPR Initiative Prioritization Tool

To enable effective execution of compliance, GDPR initiatives should be evaluated and prioritized.

Data Protection Impact Assessment Tool

To enable effective execution of compliance to the GDPR, a Data Protection Impact Assessment should be completed for processing activities that put data subjects at risk.

Build a Privacy Program – Phases 1-3

This storyboard will help you understand why a privacy program is necessary for any organization and walk you through the steps to implement a plan accordingly.

Develop Your Security Outsourcing Strategy – Phase 2: Select the Right MSSP

This phase of the blueprint, Develop Your Security Outsourcing Strategy, will help you evaluate the different MSSPs in order to determine which one will provide the best...

Identify the Best Framework for Your Security Policies

Develop security policies based on the framework that aligns with your organizational needs. NIST and ISO are two leading frameworks to structure your policies. See this...

Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan – Phases 1-3

This storyboard will help you to take a proactive approach to identifying the needed technical skills for your future environment and to systematically decide how to...
GET HELP Contact Us
VL Methodology