Select and Implement A Next Generation Endpoint Protection Solution – Phase 1: Create an Effective Endpoint Protection Strategy

Assess the use-case and corresponding feature-set that best aligns with the organizational landscape.

Select and Implement a Next Generation Endpoint Protection Solution – Phase 2: Select an Endpoint Protection Solution

Streamline the endpoint procurement process by identifying the vendor that best satisfies the use-case criteria.

Improve Security Governance With a Security Steering Committee – Phases 1-3

This storyboard will help you set up your steering committee and identify the key players, their responsibilities and the capabilities of your committee.

Improve Security Governance With a Security Steering Committee – Phase 1: Define Committee Purpose and Responsibilities

This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you define your committee.

Improve Security Governance With a Security Steering Committee – Phase 2: Determine Information Flows, Membership & Accountabilities

This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you determine how information will flow between the committee and...

Improve Security Governance With a Security Steering Committee – Phase 3: Operate the Information Security Steering Committee

This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you define your meeting agendas and the procedures to support those...

Optimize Security Mitigation Effectiveness Using STRIDE – Phase 2: Data and Element Inventory

This phase of the Optimize Security Mitigation Effectiveness blueprint will help you to perform data discovery to identify critical information and where it flows.

Optimize Security Mitigation Effectiveness Using STRIDE – Phase 3: Threat Severity Assessment

This phase of the Optimize Security Mitigation Effectiveness blueprint will help you to assess your systems threat landscape and perform a quantified threat severity analysis.

Combine Security Risk Management Components Into One Program – Phases 1-4

This storyboard will help you build a right-sized security risk management program that allows you to have a dynamic approach to triaging, assessing, and presenting risk.

Select and Implement a Next Generation Endpoint Protection Solution – Phases 1-3

Endpoint protection is an ever-consolidating market of security controls. Stay up to date; define the endpoint protection strategy and feature set that best aligns with...
GET HELP Contact Us
×
VL Methodology