Cybersecurity Priorities in Times of Pandemic Storyboard

The recent events around COVID-19 have been unprecedented, and organizations have taken measures to maintain business continuity. IT is supporting business continuity...

Reinforce End-User Security Awareness During Your COVID-19 Response Storyboard

Augment your security and training program with considerations for remote users during the COVID-19 pandemic.

Build Your Security Operations Program From the Ground Up – Phase 4: Develop an Implementation Roadmap

This phase of the blueprint, Build Your Security Operations From the Ground Up, will help you make your case to the board and develop a roadmap for your prioritized...

Build Your Security Operations Program From the Ground Up – Phases 1-4

Use this blueprint to establish your security operations program with a threat collaboration environment.

Build Your Security Operations Program From the Ground Up – Phase 1: Establish Your Foundation

This phase of the blueprint, Build Your Security Operations From the Ground Up, will help you determine how to establish the foundation of your security operations.

Build Your Security Operations Program From the Ground Up – Phase 2: Assess Your Current State

This phase of the blueprint, Build Your Security Operations From the Ground Up, will help you assess the maturity of your prevention, detection, analysis, and response...

Build Your Security Operations Program From the Ground Up – Phase 3: Design Your Target State

This phase of the blueprint, Build Your Security Operations From the Ground Up, will help you design a target state and improve your governance and policy solutions.

Create a Disaster-Ready Ransomware Recovery Plan – Phases 1-4

Use this blueprint to coordinate your incident management and disaster recovery programs to plan for and mitigate the impact of ransomware.

Create a Disaster-Ready Ransomware Recovery Plan – Phase 1: Assess Your Ransomware Readiness

This phase of the blueprint will help you assess your overall ransomware response readiness.

Create a Disaster-Ready Ransomware Recovery Plan – Phase 2: Determine Business Impact to Understand Acceptable RTOs and RPOs

This phase of the blueprint will help you determine the overall business impact of a ransomware incident.
GET HELP Contact Us
×
VL Methodology