Security Risk, Strategy & Governance - Solution Sets

Combine Security Risk Management Components Into One Program

IT departments are tasked with implementing new projects, but are often unsure how to assess the risk. Often, they use informal discussions that do not allow the business...
  • guided implementation icon

Dive Into Five Years of Security Strategies

Since 2013, Info-Tech’s “Build an Information Security Strategy” research has been used to help our members build their security programs. Using our own Security...

Build a Privacy Program

Don’t wait until a privacy incident occurs – start building a privacy program now. Use Info-Tech’s Privacy Framework to understand your current state of privacy and where...
  • guided implementation icon

Develop Necessary Documentation for GDPR Compliance

Understand your GDPR requirements concerning your data protection officer, retention requirements, and privacy and cookie policies. Use this blueprint to customize...

Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan

The cybersecurity skills gap is an ever-growing challenge that all organizations will eventually face. To circumvent the problem, actively plan for the shortage by...
  • guided implementation icon

Improve Security Governance With a Security Steering Committee

Successful information security governance requires a venue to address security concerns with participation across the entire business. Without access to requisite...
  • guided implementation icon

Align Your Security Controls to Industry Frameworks for Compliance

When assessing your information security program against an industry framework, don’t reinvent the wheel; use the tools in this blueprint to align your current assessment...

Fast Track Your GDPR Compliance Efforts

The GDPR enforcement deadline is here. Organizations must understand the risk of non-compliance and what the ramifications may mean for their reputation and future...
  • guided implementation icon

Understanding Regulation With Blockchain Technology

Understand the implications of blockchain from a usage and forensic perspective, as well as the potential unique issues of this transformative technology.
  • guided implementation icon

Discover and Classify Your Data

The sensitivity of data varies significantly, from public information to highly confidential trade secrets. To ensure proper protection, businesses need to identify and...
  • guided implementation icon
GET HELP Contact Us
×
VL Methodology