Security Risk, Strategy & Governance

Optimize Security Mitigation Effectiveness Using STRIDE

Your perception of how well you are protected is only as good as the information you collect, and many organizations struggle with collecting the right information....
  • guided implementation icon

Optimize Security Mitigation Effectiveness Using STRIDE – Phases 1-6

Use Info-Tech's unique and powerful process to assess your organization's threat landscape and security controls to create an insightful and actionable plan to optimize...

Leverage Threat Intelligence for Your Organization in Five Steps

These five steps will take you through what you need to know to use threat intelligence to improve your organization’s overall security, no matter what your level of...

Comply with the Security Requirements of HIPAA or SOX – Phases 1-3

This storyboard will walk you through the management of security compliance in regards to HIPAA and SOX. It will define gaps, and create an actionable roadmap to assist...

Comply with the Security Requirements of HIPAA or SOX – Phase 1: Assess Current State

The first phase of this project will walk through identifying and defining your compliance obligations. It will then move through a current state assessment of the...

Compliance Business Case Template

This template will allow you to plan your security compliance management for HIPAA and/or SOX. Document your goals, objectives, and other project steps in this template...

Security Compliance Translator Tool

This tool will allow you to review the security compliance requirements of HIPAA and SOX, and identify where there are existing gaps.

Comply with the Security Requirements of HIPAA or SOX – Phase 2: Perform a Gap Analysis

This phase will allow you to identify any existing gaps and create gap initiatives to close your security compliance requirements in HIPAA and/or SOX.

Comply with the Security Requirements of HIPAA or SOX – Phase 3: Build a Roadmap

This phase will assist in prioritizing compliance gap initiatives, and then creating an actionable roadmap to close any security compliance requirements in HIPAA and/or SOX.

Security Compliance Roadmap Tool

To close any existing security compliance gaps, focus on prioritizing gap initiatives and then creating a formal roadmap to ensure responsibility and timelines are...
GET HELP Contact Us
×
VL Methodology