Security Risk, Strategy & Governance - Videos

10ff6a0a287abbe5e0f86947419348eb large

Worth the Risk? Bringing Disease into Hospitals via Mobile Devices

Mobile devices compromise biosecurity and information security. Use management of biosecurity risks as both a carrot and stick to enhance...
F38115501db8ca3b2c49d77b57e8b5f9 large

Select an E-mail Archiving Solution with Confidence

The e-mail archiving market is a confusing mixture of storage vendors, compliance and e-discovery vendors, security vendors, and e-mail platform...
Fd40777c086459b5aed7de0dee09c8ca large

Video: Security Architecture Recommendation Tool

This video acts as a virtual tour through the Security Architecture Recommendation Tool. Use it to gain a better understanding of the purpose and...
119a42e8473b367358ffe12b589a8298 large

Webinar: 2025 Security Trend Report

To future-proof your security program, you need to understand and plan for emerging threats and trends. In this webinar we will introduce you to...
Aa1ec2ffb1ca91ec53675273b36cfe7a large

Webinar: Responsibly Resume IT Operations in the Office

IT must quickly identify the must-dos to allow a safe return to the office. During this webinar we will go through how to build a prioritized...
GET HELP Contact Us
×
VL Methodology