Security Strategy & Governance - Tools

Information Security Program Gap Analysis Tool

To enable an effective security program, all areas of security need to be evaluated closely to determine where the organization sits currently and where it needs to go to...

Information Security Requirements Gathering Tool

Align your security projects properly by clearly defining business needs, and customer / compliance obligations, as well as documenting scope, boundaries, and risk tolerance.

Information Security Pressure Analysis Tool

Security pressure posture analysis helps your organization assess your real security context and enables you to invest in the right security functions while balancing the...

Endpoint Protection TCO & ROI Comparison Calculator

Use this TCO and ROI calculator to compare costs and benefits when examining various endpoint protection solutions.

Endpoint Protection Roadmap & RACI Tool

Assign responsibilities and deadlines for the endpoint protection implementation and management process.

Security Budgeting Tool

This tool will allow you to build a security budget that maps security controls to the business capabilities they enable, while creating three different budget options...

Security Culture Maturity Assessment and Content Development Tool

This tool will assess the current maturity of the security culture within your organization, while also helping to understand the urgency and priority of different topics...

End-User Security Knowledge Test Tool

This tool allows you to test end users to understand their current level of security knowledge as an alternative to LMS-style or survey-based testing.

Group Risk and Vulnerability Assessment Tool

This tool will help you identify user groups within your organization and determine what the risk profile is for each group.

Security Awareness and Training Roadmap Tool and Participant Tracker

This tool will help you plan an implementation timeline for your human-centric security program, as well as a training schedule for the different end-user groups and the...
GET HELP Contact Us
VL Methodology