Storyboard: Cut PCI Compliance and Audit Costs in Half

If you are a merchant, chances are you still need to be PCI compliant or you are in the middle of the process. It doesn’t have to be overwhelming or costly. Choose the...

Build a Business-Driven IT Risk Management Program – Phases 1-3

Risk is an unavoidable part of IT. And what you don't know, CAN hurt you. The question is, do you tackle risk head-on or leave it to chance? Get a handle on risk...

Build a Business-Driven IT Risk Management Program – Phase 1: Review IT Risk Fundamentals and Governance

Review the foundations of IT risk management and establish a robust governance framework.

Build a Business-Driven IT Risk Management Program – Phase 2: Identify and Assess IT Risk

Identify and assess IT's greatest risks.

Build a Business-Driven IT Risk Management Program – Phase 3: Monitor, Communicate, and Respond to IT Risk

Establish monitoring responsibilities, develop risk responses, and communicate your risk priorities to the business.

Optimize Security Mitigation Effectiveness Using STRIDE – Phase 1: Setup – Data and Asset Classification

Start your mitigation effectiveness assessment by establishing a foundational data and IT system element classification from which to launch the assessment.

Optimize Security Mitigation Effectiveness Using STRIDE – Phase 2: Data and Element Inventory

This phase of the Optimize Security Mitigation Effectiveness blueprint will help you to perform data discovery to identify critical information and where it flows.

Optimize Security Mitigation Effectiveness Using STRIDE – Phase 3: Threat Severity Assessment

This phase of the Optimize Security Mitigation Effectiveness blueprint will help you to assess your systems threat landscape and perform a quantified threat severity analysis.

Optimize Security Mitigation Effectiveness Using STRIDE – Phase 4: Control Maturity Assessment

This phase of the blueprint, Optimize Security Mitigation Effectiveness, will help you to catalogue your existing security controls and see how they address your existing...

Optimize Security Mitigation Effectiveness Using STRIDE – Phase 5: Outputs and Interpretation

This phase of the blueprint, Optimize Security Mitigation Effectiveness, will help you to understand and interpret the results of the assessment and gain insight into how...
GET HELP Contact Us
×
VL Methodology