Security Risk, Strategy & Governance

Optimize Security Mitigation Effectiveness Using STRIDE – Executive Brief

Are you secure? And how would you know if you weren't? Read this Executive Brief to understand why a mitigation effectiveness assessment is the first step towards a...

Optimize Security Mitigation Effectiveness Using STRIDE – Phase 1: Setup – Data and Asset Classification

Start your mitigation effectiveness assessment by establishing a foundational data and IT system element classification from which to launch the assessment.

Mitigation Effectiveness Assessment Tool

To ensure that your security controls are right-sized to your threat landscape and the data you are protecting, perform a detailed and accurate analysis that can guide...

Optimize Security Mitigation Effectiveness Using STRIDE – Phase 2: Data and Element Inventory

This phase of the Optimize Security Mitigation Effectiveness blueprint will help you to perform data discovery to identify critical information and where it flows.

Optimize Security Mitigation Effectiveness Using STRIDE – Phase 3: Threat Severity Assessment

This phase of the Optimize Security Mitigation Effectiveness blueprint will help you to assess your systems threat landscape and perform a quantified threat severity analysis.

Optimize Security Mitigation Effectiveness Using STRIDE – Phase 4: Control Maturity Assessment

This phase of the blueprint, Optimize Security Mitigation Effectiveness, will help you to catalogue your existing security controls and see how they address your existing...

Optimize Security Mitigation Effectiveness Using STRIDE – Phase 5: Outputs and Interpretation

This phase of the blueprint, Optimize Security Mitigation Effectiveness, will help you to understand and interpret the results of the assessment and gain insight into how...

Optimize Security Mitigation Effectiveness Using STRIDE – Phase 6: Implementation and Maintenance

This phase of the Optimize Security Mitigation Effectiveness will help you to create a prioritized action plan based on your assessment, and plan to reassess and maintain...

Mitigation Effectiveness and Gap Initiative Communication Deck

Use this template to present the results of your mitigation effectiveness assessment to your stakeholders.

Embed Security Architecture Into All Things IT

Assess your security needs, define security architecture principles, and define security reference architecture.
GET HELP Contact Us
×
VL Methodology