Security Risk, Strategy & Governance

Security Risk Management Presentation Template

This template offers a sample presentation of a risk management program, including an overview of the program and major risks.

Threat and Risk Assessment Process Template

Use this template to document the exact process your organization uses when conducting a threat and risk assessment.

Backup and Recovery Service Level Agreement Template

Ensure your designed processes are ready to be employed into the business environment by conducting a series of testing. Use this template to support process owners and...

WikiLeaks – Vault 7 Releases

What do the Vault 7 releases mean for you? (And what do they NOT mean.)

Build a Data Privacy Program

Sell privacy to the business by speaking a language they understand. IT and InfoSec leaders need to see privacy as more than just compliance – as a driver of business...
  • guided implementation icon

Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan

The cybersecurity skills gap is an ever-growing challenge that all organizations will eventually face. To circumvent the problem, actively plan for the shortage by...
  • guided implementation icon

Business Requirement Security Strategy Mapping Tool

Use this tool to map business and IT initiatives to specific security mitigation controls. This tool is a documentation and mapping support tool as part of your larger...

Endpoint Protection TCO & ROI Comparison Calculator

Use this TCO and ROI calculator to compare costs and benefits when examining various endpoint protection solutions.

Discover and Classify Your Data – Phase 2: Discover the Data

This phase of the blueprint will help you perform and manage data discovery.

Risk Management Program Manual

Formalizing a risk management program requires creating repeatable and iterative processes, and documenting best practices. Create a comprehensive manual to serve as the...
GET HELP Contact Us
×
VL Methodology