Threat and Risk Assessment Process Template

Use this template to document the exact process your organization uses when conducting a threat and risk assessment.

Threat and Risk Assessment Tool

Use this tool to assess the threat and risk severity with any particular IT project or initiative.

Risk Tolerance Determination Tool

This tool helps you determine risk tolerance level to guide future assessments and accurately identify unacceptable risks.

Combine Security Risk Management Components Into One Program

IT departments are tasked with implementing new projects, but are often unsure how to assess the risk. Often, they use informal discussions that do not allow the business...
  • guided implementation icon

Develop Necessary Documentation for GDPR Compliance

Understand your GDPR requirements concerning your data protection officer, retention requirements, and privacy and cookie policies. Use this blueprint to customize...

Data Protection Officer Job Description Template

Use this template to outline your requirements for a data protection officer, in compliance with the GDPR.

Improve Security Governance With a Security Steering Committee – Phase 1: Define Committee Purpose and Responsibilities

This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you define your committee.

Improve Security Governance With a Security Steering Committee – Phase 2: Determine Information Flows, Membership & Accountabilities

This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you determine how information will flow between the committee and...

Improve Security Governance With a Security Steering Committee – Phase 3: Operate the Information Security Steering Committee

This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you define your meeting agendas and the procedures to support those...

Information Security Steering Committee Stakeholder Presentation

Use this template to explain the goals and benefits of the Information Security Steering Committee.
GET HELP Contact Us
×
VL Methodology