Security Risk, Strategy & Governance - Videos

Fd40777c086459b5aed7de0dee09c8ca large

Video: Security Architecture Recommendation Tool

This video acts as a virtual tour through the Security Architecture Recommendation Tool. Use it to gain a better understanding of the purpose and...
10ff6a0a287abbe5e0f86947419348eb large

Worth the Risk? Bringing Disease into Hospitals via Mobile Devices

Mobile devices compromise biosecurity and information security. Use management of biosecurity risks as both a carrot and stick to enhance...
F38115501db8ca3b2c49d77b57e8b5f9 large

Select an E-mail Archiving Solution with Confidence

The e-mail archiving market is a confusing mixture of storage vendors, compliance and e-discovery vendors, security vendors, and e-mail platform...
Aa1ec2ffb1ca91ec53675273b36cfe7a large

Webinar: Responsibly Resume IT Operations in the Office

IT must quickly identify the must-dos to allow a safe return to the office. During this webinar we will go through how to build a prioritized...
GET HELP Contact Us
×
VL Methodology