Security Risk, Strategy & Governance

Data Audit Interview Schedule

​Use the Data Audit Interview Schedule to ensure you organize interviews with the proper data audit participants.

Data Audit Scorecard

The Data Audit Scorecard identifies the areas in which the health of your data can be modified for improvement. Use this template to see where you fall short so you can...

Data Source Inventory Tool

The Data Source Inventory Tool will help you document relevant information pertaining to each data source to act as a point of reference document.

Data Audit Stakeholder Interview Guide

Data owners, data stewards, and end users are the ones who use the data on a day-to-day basis and will be able to provide the best information regarding ongoing data...

IaaS and PaaS Security Communication Deck

Communicating security, especially cloud security, can be a difficult obstacle. This communication deck will provide you with the necessary medium to convey your findings.

Lenovo, Superfish, MITM attacks, and SSL Interception: the Bigger Picture

Lenovo’s strategy to pre-install the Superfish application on some consumer devices was fundamentally irresponsible and a squander of customers’ trust.

Select and Implement an Intrusion Detection and Prevention System – Executive Brief

​Today’s threat landscape is more unpredictable than ever. An intrusion detection and prevention system (IDPS) is an essential layer if you want to comprehensively...

Select and Implement an Intrusion Detection and Prevention System – Phases 1-4

​Today’s threat landscape is more unpredictable than ever. An intrusion detection and prevention system (IDPS) is an essential layer if you want to comprehensively...

Information Security Awareness and Training Appropriateness Tool

Use this tool to allow you to determine your organization's specific appropriateness for having a security awareness and training program.

Information Security Awareness and Training Content Development Tool

This tool will help to identify content that should be covered by your security awareness and training program.
GET HELP Contact Us
×
VL Methodology