Implement and Optimize an Effective Security Management Metrics Program – Phase 2: Develop Metrics Program Roadmap

Once you know what you need in terms of metrics, begin prioritization and planning for implementation.

Understanding Regulation With Blockchain Technology – Phases 1-2

Understand the implications of blockchain from a usage and forensic perspective, as well as the potential unique issues of this transformative technology.

Understanding Regulation With Blockchain Technology – Phase 1: How Blockchain Can Disrupt Data Reporting

Understand blockchain through a business-centric definition and discover use cases of blockchain across industries.

Understanding Regulation With Blockchain Technology – Phase 2: Build and Evaluate an Inventory of Use Cases

Envision how blockchain can enhance your organization’s key capabilities, determine whether blockchain aligns with your enterprise, and communication your findings to...

Forge an Ironclad Reporting Strategy for Security Metrics Storyboard

Develop a strategy for presenting security metrics to the board by creating high-level, easy-to-digest metrics based on business risk.

Develop Your Security Outsourcing Strategy – Phases 1-3

This storyboard will help you decide which security responsibilities/functions you can outsource, select a managed security service provider (MSSP), and finally, manage...

Develop Your Security Outsourcing Strategy – Phase 2: Select the Right MSSP

This phase of the blueprint, Develop Your Security Outsourcing Strategy, will help you evaluate the different MSSPs in order to determine which one will provide the best...

Create a Disaster-Ready Ransomware Recovery Plan – Phases 1-4

Use this blueprint to coordinate your incident management and disaster recovery programs to plan for and mitigate the impact of ransomware.

Create a Disaster-Ready Ransomware Recovery Plan – Phase 1: Assess Your Ransomware Readiness

This phase of the blueprint will help you assess your overall ransomware response readiness.

Create a Disaster-Ready Ransomware Recovery Plan – Phase 2: Determine Business Impact to Understand Acceptable RTOs and RPOs

This phase of the blueprint will help you determine the overall business impact of a ransomware incident.
GET HELP Contact Us
×
VL Methodology