Security Risk, Strategy & Governance

Anti-Virus Policy

The anti-virus policy provides a computing network that is virus-free; this policy provides instructions on measures that must be taken by company employees to help...

Hire or Develop a World-Class CISO

Use this blueprint to hire or develop a world-class Chief Information Security Officer (CISO) with the competencies that suit your specific organizational needs. Once you...
  • guided implementation icon

Hire or Develop a World-Class CISO – Executive Brief

Your CISO must be integrated with the business in order to be successful. If your CISO is stuck guarding the perimeter rather than enabling business processes, this...

Hire or Develop a World-Class CISO – Phases 1-4

Use this blueprint to hire or develop a world-class CISO with the competencies that suit your specific organizational needs. Once you have identified the right candidate,...

Hire or Develop a World-Class CISO – Phase 1: Launch

Understand the core competencies required to be a successful world-class CISO, and identify which ones are a priority for you.

CISO Core Competency Evaluation Tool

Use this tool to identify which competencies are most important to your organization, and what your current proficiency is in each competency.

Hire or Develop a World-Class CISO – Phase 2: Assess

Assess CISO candidates to hire or develop the right CISO for your organizational needs, and understand the CISO's stakeholder relationships.

CISO Stakeholder Power Map Template

Identify and manage key stakeholders to improve your relationships within the organization.

Hire or Develop a World-Class CISO – Phase 3: Plan

Once the right person has been found, evaluate the new CISO's security program and create a plan to close any security and competency gaps.

Security Process and Technology Assessment Tool

Use this tool to create a comprehensive, high-level view of your information security process and technology maturity.
GET HELP Contact Us
×
VL Methodology