Security Risk, Strategy & Governance

Proteus Helps Enterprises Document Privacy by Design

Privacy by Design (PbD) is a General Data Protection Regulation (GDPR) requirement, but effective implementation requires deep insight into the operation and...

National Cyber Security Alliance Names Habitu8 As Their Official Security Awareness Video Training Partner

For 2019’s National Cybersecurity Awareness Month (NCSAM), the National Cyber Security Alliance (NCSA) has named the security awareness and training vendor Habitu8 its...

KnowBe4 Releases Machine Learning Module for PhishER Platform

Security awareness and training vendor KnowBe4 has added a machine learning module called PhishML to its existing SOAR platform, PhishER.

Satisfy Customer Requirements for Information Security – Executive Brief

Read this Executive Brief to understand why you need to develop a strategy for managing customer expectations for information security, and consider whether a security...

Satisfy Customer Requirements for Information Security – Phases 1-3

This storyboard will help you satisfy customer requirements for information security and determine if SOC 2 or ISO 27001 certification is right for you.

Satisfy Customer Requirements for Information Security – Phase 1: Manage Customer Expectations for Information Security

This phase of the blueprint, Satisfy Customer Requirements for Information Security, will help you understand customer expectations for information security and build a...

Satisfy Customer Requirements for Information Security – Phase 2: Select a Certification Path

This phase of the blueprint, Satisfy Customer Requirements for Information Security, will help you understand your options for obtaining a security certification and...

Security Certification Selection Tool

Use this tool to determine whether your organization should consider SOC 2 or ISO 27001 certification to help manage customer expectations for information security.

Security Certification Business Case Tool

Use this tool to help build a business case for obtaining an information security certification such as SOC 2 or ISO 27001.

Satisfy Customer Requirements for Information Security – Phase 3: Obtain and Maintain Certification

This phase of the blueprint, Satisfy Customer Requirements for Information Security, will help you determine the scope of your certification, prepare for and pass the...
GET HELP Contact Us
×
VL Methodology