Security Risk, Strategy & Governance - Storyboard

Build an Information Security Strategy – Phase 1: Assess Requirements

This phase of the blueprint, Build an Information Security Strategy, will help you bring your security program into alignment with the organization.

Improve Security Governance With a Security Steering Committee – Phase 1: Define Committee Purpose and Responsibilities

This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you define your committee.

Improve Security Governance With a Security Steering Committee – Phase 2: Determine Information Flows, Membership & Accountabilities

This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you determine how information will flow between the committee and...

Improve Security Governance With a Security Steering Committee – Phase 3: Operate the Information Security Steering Committee

This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you define your meeting agendas and the procedures to support those...

Build, Optimize, and Present a Risk-Based Security Budget – Phases 1-3

This storyboard will help you build a security budget that adapts to risks and threats, while also taking into account your business model, making it easier to...

Build, Optimize, and Present a Risk-Based Security Budget – Phase 1: Review Requirements for the Budget

This phase of the blueprint, Build, Optimize, and Present a Risk-Based Security Budget, will help you gather the requirements needed and review them to ensure you can...

Build, Optimize, and Present a Risk-Based Security Budget – Phase 2: Build the Budget

This phase of the blueprint, Build, Optimize, and Present a Risk-Based Security Budget, will help you build a budget that maps security controls to their business...

Discover and Classify Your Data – Phase 3: Classify the Data

This phase of the blueprint will help you assign proper classifications to your data and track meaningful metrics to continually improve the program.

Implement a Security Governance and Management Program – Phase 1: Align Business Goals With Security Objectives

This phase of the blueprint, Implement a Security Governance and Management Program, will help you align your organization's security objectives with its business goals...

Combine Security Risk Management Components Into One Program – Phase 4: Communicate the Risk Management Program

This phase of the blueprint will help you report on risk based on the requirements needed within your organization.
GET HELP Contact Us
×
VL Methodology