Security Risk, Strategy & Governance - Tools

Resume Operations Information Security Pressure Analysis Tool

Use this tool in phase 1 of the Responsibly Resume IT Operations in the Office research to evaluate and better understand the organization's post-pandemic risk tolerance.

Mid-Pandemic IT Prioritization Tool

The Mid-Pandemic IT Prioritization Tool simplifies the long to-do list of transition tasks for your IT and InfoSec team to carry out. Identify, classify, and prioritize...

Data Process Mapping Tool Lite

Use the Data Process Mapping Tool Lite to map out the flow of personal data. Apply your privacy framework to new and/or temporary business processes involving personal...

Data Protection by Design Matrix

Use this matrix to track DPbD best practices across your IT systems, business processes, and application development.

Data Protection by Design IT Systems Record

Use this matrix to record the specific DPbD controls your organization is using to ensure data privacy across IT systems.

Security Awareness and Training Program Development Tool

This tool will help you identify initiatives to develop your security awareness and training program. The tool focuses on four areas of initiatives: the fundamentals,...

Security Awareness and Training Metrics Tool

This tool will help you identify and select metrics for measuring the success of your security awareness and training program.

Security Training Campaign Development Tool

This tool will help you identify user groups within your organization and determine what the risk profile is of each group. It will help you prioritize security training...

Security Awareness and Training Vendor Evaluation Tool

This tool will help you discover how the organization wants to evaluate vendors in this space. Once vendors have been contacted, the tool can be used to compare them...

Security Certification Selection Tool

Use this tool to determine whether your organization should consider SOC 2 or ISO 27001 certification to help manage customer expectations for information security.
GET HELP Contact Us
×
VL Methodology