Security Risk, Strategy & Governance

Information Security Charter

Without a charter to control and set clear objectives for security, the responsibility of security governance initiatives will likely be undefined within the enterprise,...

Comply with the Security Requirements of HIPAA or SOX

Focus on translating wordy or ambiguous security obligations into security requirements that can be turned into actions and initiatives to be prioritized and carried out.
  • guided implementation icon

Recovery Operating Procedures Template

Use this Recovery Operating Procedures Template in conjunction with the Optimize Backup Operations with a Recovery Services Plan Storyboard to document operating...

Data Classification Policy

Use this template to document a formal policy to define your data classification program.

Data Classification Inventory Tool

Use this tool to track and classify corporate data. Gain insight on the location and security of various data and repositories to drive strategic security decisions.

Security Governance and Management Implementation Roadmap

Use this tool to build a roadmap to help you reach your target state.

Develop a Security Awareness and Training Program That Empowers End Users

Cyberattackers target your end users, who remain today’s weakest link in organizational security. Design and deliver an effective and up-to-date training program to...
  • guided implementation icon

Discover and Classify Your Data

The sensitivity of data varies significantly, from public information to highly confidential trade secrets. To ensure proper protection, businesses need to identify and...
  • guided implementation icon

Information Security Incident Response Process Template

Use this template to define a specific process for managing information security incidents to minimize their impact on the organization.

Security Risk Register Tool

This tool will allow you to collect, analyze, and combine individual risks and view the aggregate level of risk within the organization, including how it compares to your...
GET HELP Contact Us
×
VL Methodology