Security Risk, Strategy & Governance

Discover and Classify Your Data – Phase 1: Formalize the Classification Program

This phase of the blueprint will help you understand the importance of data classification and aid you in developing a classification scheme that meets your...

Align Your Security Controls to Industry Frameworks for Compliance

When assessing your information security program against an industry framework, don’t reinvent the wheel; use the tools in this blueprint to align your current assessment...

Security Awareness Training Procedural Policy

Formalize your security awareness and training program into a policy to ensure that your employees are held accountable.

Example Data Flow Diagram – e-Commerce

Use this example as a starting point to documenting your data flow diagrams.

Mitigation Effectiveness Assessment Tool

To ensure that your security controls are right-sized to your threat landscape and the data you are protecting, perform a detailed and accurate analysis that can guide...

Data Discovery Interview Tracking Tool

Use this tool to conduct interviews with data owners in your organization. Discover what and where your data exists and the current data handling procedures in place.

Security Compliance Roadmap Tool

To close any existing security compliance gaps, focus on prioritizing gap initiatives and then creating a formal roadmap to ensure responsibility and timelines are...

Email Security Gateway Financial Calculator

The manner in which an organization's email is cleaned and secured can either be an unnoticed cost or high value savings. A major security challenge faced by SMBs is...

Risk Weighting Determination Tool

Use this tool to determine how impact and frequency ratings given to risks should be weighted.

Dive Into Five Years of Security Strategies Storyboard

This storyboard will help you review how organizations are building their security strategies.
GET HELP Contact Us
×
VL Methodology