Close the InfoSec Skills Gap: Develop a Skills Sourcing Plan for Future Work Roles – Phase 3: Develop a Sourcing Plan for Future Work Roles

This phase of the blueprint will help you decide how to acquire skills.

Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan – Phases 1-3

This storyboard will help you to take a proactive approach to identifying the needed technical skills for your future environment and to systematically decide how to...

Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan – Phase 1: Identity Skill Needs for Target State

This phase of the blueprint will help you define your security initiative skill needs.

Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan – Phase 2: Identify Technical Skill Gaps

This phase of the blueprint will help you align role requirements with future initiative skill needs.

Reduce and Manage Your Organization's Insider Threat Risk – Phases 1-2

Understand the variety of threats from malicious, accidental, and negligent insiders. Assess security maturity vis-à-vis insider threat. Formally develop an insider...

Reduce and Manage Your Organization's Insider Threat Risk – Phase 1: Understand What Insider Threats Are and Where They Come From

This phase of the blueprint, Reduce and Manage Your Organization's Insider Threat Risk, will help you understand the threats and controls associated with insider threat.

Reduce and Manage Your Organization's Insider Threat Risk – Phase 2: Implement an Insider Threat Program

This phase of the blueprint, Reduce and Manage Your Organization's Insider Threat Risk, will help you implement an insider threat program and complete an employee...

Combine Security Risk Management Components Into One Program – Phases 1-4

This storyboard will help you build a right-sized security risk management program that allows you to have a dynamic approach to triaging, assessing, and presenting risk.

Combine Security Risk Management Components Into One Program – Phase 1: Establish the Risk Environment

This phase of the blueprint will help you define responsibilities and accountabilities within your security risk management program and an organizational risk tolerance level.

Combine Security Risk Management Components Into One Program – Phase 4: Communicate the Risk Management Program

This phase of the blueprint will help you report on risk based on the requirements needed within your organization.
GET HELP Contact Us
×
VL Methodology