BitSight Says Cyber Risk Ratings Are a Good Measure of Internal Risk – Is It Right?

BitSight Enterprise Analytics looks to increase the value proposition of using cyber risk ratings for internal risk management, but are they barking up the wrong tree? If...

Panorays Gifts Its Customers a Mixed Blessing in Access to Shared Assessments Program Questionnaire

Panorays has announced a partnership with Shared Assessments to provide Panorays customers with access to the Standard Information Standard (SIG) questionnaire. This is...

Privacy Regulation Roundup

This Privacy Regulation Roundup summarizes the latest major global privacy regulatory development, announcements, and changes. This report is updated on a monthly basis.

Threat Landscape Briefing – September 2019

This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals, hacktivists campaigns, data breaches, control strategies,...

Satisfy Customer Requirements for Information Security – Phase 1: Manage Customer Expectations for Information Security

This phase of the blueprint, Satisfy Customer Requirements for Information Security, will help you understand customer expectations for information security and build a...

Satisfy Customer Requirements for Information Security – Phase 2: Select a Certification Path

This phase of the blueprint, Satisfy Customer Requirements for Information Security, will help you understand your options for obtaining a security certification and...

Security Certification Selection Tool

Use this tool to determine whether your organization should consider SOC 2 or ISO 27001 certification to help manage customer expectations for information security.

Security Certification Business Case Tool

Use this tool to help build a business case for obtaining an information security certification such as SOC 2 or ISO 27001.

Satisfy Customer Requirements for Information Security – Phase 3: Obtain and Maintain Certification

This phase of the blueprint, Satisfy Customer Requirements for Information Security, will help you determine the scope of your certification, prepare for and pass the...

Symantec Leaves the Strongest Emotional Footprint in the IAM Space With Its Symantec VIP Product

Recent data released from SoftwareReviews' Identity Access Management (IAM) Customer Experience Report reveals Symantec VIP is performing above the rest when it comes to...
GET HELP Contact Us
×
VL Methodology