Security Risk, Strategy & Governance

Kenna Security Offers Vulnerability Management Options: Kenna.VM & Kenna.VI

Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created...

PHEMI: A Data Privacy Tool for Healthcare Providers

PHEMI is a data privacy solution focused on keeping data-processing activities secure by redacting information based on the role of the accessor. Thus, allowing such data...

Air Canada's Temperature Testing Raises Concern for Individual Data Privacy, Explained by a Privacy Expert

In an interview with Info-Tech analysts, privacy expert Dr. Ann Cavoukian explains why Air Canada's recent mandatory temperature check policy to screen for COVID-19...

2025 Security Trend Report

To future-proof the CISO, this 2025 Security Trends Report synthesizes input from industry leaders and subjects it to structured scenario analysis using Info-Tech...

2025 Security Trend Report Storyboard

Read the 2025 Security Trend Report to understand how emerging threats and new trends in cybersecurity will impact your organization and how CISOs can prepare for them.

Information Security Steering Committee Charter

A charter is the organizational mandate that outlines the purpose, scope, and authority of the Information Security Steering Committee.

Information Security Steering Committee RACI Chart

Use this RACI chart to keep track of responsibility and accountability for tasks related to your Information Security Steering Committee.

Security Policy Hierarchy Diagram

Use this example diagram as a reference to help you categorize and structure your organization's security policies.

Security Governance Model Facilitation Questions

Use these questions to help spur discussion about how your governance will be structured.

Information Security Governance Model Tool

Use this tool to create a visual representation of your governance structure.
GET HELP Contact Us
×
VL Methodology