Security Risk, Strategy & Governance - Tools

Data Protection by Design Matrix

Use this matrix to track DPbD best practices across your IT systems, business processes, and application development.

Data Protection by Design IT Systems Record

Use this matrix to record the specific DPbD controls your organization is using to ensure data privacy across IT systems.

Security Awareness and Training Program Development Tool

This tool will help you identify initiatives to develop your security awareness and training program. The tool focuses on four areas of initiatives: the fundamentals,...

Security Awareness and Training Metrics Tool

This tool will help you identify and select metrics for measuring the success of your security awareness and training program.

Security Training Campaign Development Tool

This tool will help you identify user groups within your organization and determine what the risk profile is of each group. It will help you prioritize security training...

Security Awareness and Training Vendor Evaluation Tool

This tool will help you discover how the organization wants to evaluate vendors in this space. Once vendors have been contacted, the tool can be used to compare them...

Security Certification Selection Tool

Use this tool to determine whether your organization should consider SOC 2 or ISO 27001 certification to help manage customer expectations for information security.

Security Certification Business Case Tool

Use this tool to help build a business case for obtaining an information security certification such as SOC 2 or ISO 27001.

Subject Access Request (SAR) Registry Tool

Use this tool as a starting point to track all types of subject access requests throughout the process.

User Data Handling Requirements Tool

This tool will help you organize the data handling requirements for users throughout each phase of data's lifecycle.
GET HELP Contact Us
×
VL Methodology