Improve Security Governance With a Security Steering Committee – Phases 1-3

This storyboard will help you set up your steering committee and identify the key players, their responsibilities and the capabilities of your committee.

Improve Security Governance With a Security Steering Committee – Phase 1: Define Committee Purpose and Responsibilities

This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you define your committee.

Optimize Security Mitigation Effectiveness Using STRIDE – Phases 1-6

Use Info-Tech's unique and powerful process to assess your organization's threat landscape and security controls to create an insightful and actionable plan to optimize...

Optimize Security Mitigation Effectiveness Using STRIDE – Phase 2: Data and Element Inventory

This phase of the Optimize Security Mitigation Effectiveness blueprint will help you to perform data discovery to identify critical information and where it flows.

Optimize Security Mitigation Effectiveness Using STRIDE – Phase 3: Threat Severity Assessment

This phase of the Optimize Security Mitigation Effectiveness blueprint will help you to assess your systems threat landscape and perform a quantified threat severity analysis.

Build a Business-Driven IT Risk Management Program – Phase 2: Identify and Assess IT Risk

Identify and assess IT's greatest risks.

Build a Business-Driven IT Risk Management Program – Phase 3: Monitor, Communicate, and Respond to IT Risk

Establish monitoring responsibilities, develop risk responses, and communicate your risk priorities to the business.

Fast Track Your GDPR Compliance Efforts – Phase 1: Understand Your Compliance Requirements

This phase of the blueprint, Fast Track Your GDPR Compliance Efforts, will help you better understand the regulation and define your desired compliance outcomes.

Fast Track Your GDPR Compliance Efforts – Phase 2: Define Your GDPR Scope

This phase of the blueprint, Fast Track Your GDPR Compliance Efforts, will help you understand the areas of your organization that are top priority for compliance.

Combine Security Risk Management Components Into One Program – Phase 4: Communicate the Risk Management Program

This phase of the blueprint will help you report on risk based on the requirements needed within your organization.
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP Contact Us
×
VL Methodology