Security Risk, Strategy & Governance

Internet Acceptable Use Policy

Internet usage is both a necessary tool and a potential distraction and security risk. With capabilities of the Internet and users advancing daily, it is important for...

2020 Security Priorities Report

Use this deck to learn what projects security practitioners are prioritizing for 2020.
  • guided implementation icon

2020 Security Priorities Report – The Five Priorities

Use this deck to understand what projects security practitioners are prioritizing for 2020.

2020 Security Priorities Report – Executive Brief

This storyboard will help you learn what projects security practitioners are prioritizing for 2020.

2020 Security Priorities Report – Priority 1: Data Security

This priority of the 2020 Security Priorities Report will help you understand why data security is being prioritized by security professionals.

2020 Security Priorities Report – Priority 2: Cloud Security

This priority of the 2020 Security Priorities Report will help you understand why cloud security is being prioritized by security professionals.

2020 Security Priorities Report – Priority 3: Email Security

This priority of the 2020 Security Priorities Report will help you understand why email security is being prioritized by security professionals.

2020 Security Priorities Report – Priority 4: Security Risk Management

This priority of the 2020 Security Priorities Report will help you understand why security risk management is being prioritized by security professionals.

2020 Security Priorities Report – Priority 5: Security Awareness and Training

This priority of the 2020 Security Priorities Report will help you understand why security awareness and training is being prioritized by security professionals.

Osano Applies for Certified-B Status

Osano recently released its SaaS privacy solution aimed at simplifying compliance and vendor assessments. The product feels familiar, but Osano’s ethical commitment sets...
GET HELP Contact Us
×
VL Methodology