Security Risk, Strategy & Governance

Information Security Governance and Management Business Case

Use this template to justify the business value of implementing or improving a security governance and management program.

Security Governance and Management Target State Framework and Gap Analysis

Use this tool to build your target state information security governance and management framework and conduct a gap analysis.

eDiscovery Procedure for Legal Search

Use this template to describe the activities and responsibilities required to effectively respond to a discovery request.

The Shadow Brokers – Details on Leaked Cyberintelligence Tools and Vulnerabilities

This Info-Tech briefing will provide a synopsis of what the Shadow Brokers leak might mean for users and organizations, and what actions can be taken in response to this...

APT10 & Operation Cloud Hopper – Exposing a Global Cyberespionage Campaign

Your managed IT service providers may be leaving you vulnerable.

Hire or Develop a World-Class CISO

Use this blueprint to hire or develop a world-class Chief Information Security Officer (CISO) with the competencies that suit your specific organizational needs. Once you...
  • guided implementation icon

Security Pressure Posture Analysis Tool

Security pressure posture analysis helps your organization assess your real security context and enables your organization to invest in the right security functions while...

Information Security Risk Management Template

Use this template to build your information security risk management process.

Risk Register Tool

This is a dynamic tool that captures identified risks, assesses their severity based on your organization's risk appetite, and documents risk response actions. Use this...

Cut PCI Compliance and Audit Costs in Half

If you are a merchant, chances are you still need to be PCI compliant or you are in the middle of the process. It doesn’t have to be overwhelming or costly. Choose the...
  • guided implementation icon
GET HELP Contact Us
×
VL Methodology