Security Risk, Strategy & Governance

Insourcing vs. Outsourcing Costing Tool

This tool will help you determine the costs of outsourcing and in-house options to determine potential cost savings from outsourcing.

Develop Your Security Outsourcing Strategy – Phase 2: Select the Right MSSP

This phase of the blueprint, Develop Your Security Outsourcing Strategy, will help you evaluate the different MSSPs in order to determine which one will provide the best...

MSSP Selection Tool

This tool will rank managed security service providers (MSSPs) based on the variables selected in order to determine which MSSP is the most valuable to your organization.

Develop Your Security Outsourcing Strategy – Phase 3: Manage Your MSSP

This phase of the blueprint, Develop Your Security Outsourcing Strategy, will help you align the MSSP to your organization and create an internal metrics program to...

How Small Enterprises Should Buy Cloud Services

Small enterprise IT has been slow to adopt cloud technologies due to security concerns. Don’t let potential risks derail your efforts to optimize, expand, and transform...

Develop and Deploy Security Policies

Comprehensively developed and effectively deployed security policies enable IT professionals to work pro-actively rather than reactively, benefitting the entire...
  • guided implementation icon

Develop and Deploy Security Policies – Executive Brief

Read this Executive Brief to understand why a security policy program is fundamental for any organization who wants to improve their security posture.

Find the Right Balance Between Privacy and Security for K-12

Finding the right balance between security and privacy is difficult for K-12. IT is responsible for protecting faculty, staff, and students, but must do so while...

WannaCry – Addressing the Unprecedented Global Ransomware Attack

Protect yourself against the WannaCry ransomware attack.

Select and Implement a Next Generation Endpoint Protection Solution – Executive Brief

Read our Executive Brief to understand why you should consider a next generation endpoint protection solution.
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP Contact Us
×
VL Methodology