Ayehu Bridges Gap Between IT Ops and Sec Ops

Ayehu is working to bridge the gap between IT Operations and Security Operations. We expect to see more vendor product offerings follow suit.

Hacker Compromises Data of 106 Million Capital One Customers

A hacker has compromised 106 million Capital One customers after a data breach. But the real story might be less to do with cloud security itself and more to do with...

Apple Rushes to Fix Zoom Security Flaw

Apple has delivered a silent update to Macs, rectifying a security flaw in its Zoom web-conferencing service.

Forge an Ironclad Reporting Strategy for Security Metrics

Board-level presentations are a rare opportunity for security and business to understand each other’s viewpoints and the things they care about, and metrics are a good...
  • guided implementation icon

Forge an Ironclad Reporting Strategy for Security Metrics – Executive Brief

Read this Executive Brief to understand how security metrics can help increase business-security alignment and improve the board's understanding of cyber risks.

Forge an Ironclad Reporting Strategy for Security Metrics Storyboard

Develop a strategy for presenting security metrics to the board by creating high-level, easy-to-digest metrics based on business risk.

Security Metrics Dashboard

This tool will help you to aggregate several low-level metrics into high-level categories that demonstrate business risk and can be easily understood by the board.

Board-Level Security Metrics Presentation Template

This template will help you condense and organize your presentation into just three slides, which will help you convey the most critical information to the board...

Are Cyberattacks Like Natural Disasters?

Cyberattacks are terrible and require the same dedication to overcome them as would any other disaster response effort. Just like natural disasters, cyberattacks cause...

Security Metrics Assessment Tool

Use this assessment to identify which metrics best align with your organization's risk tolerance level and other requirements.
GET HELP Contact Us
×
VL Methodology