Build a Vendor Security Assessment Service – Phase 2: Develop Assessment Methodology

This phase of the blueprint, Build a Vendor Security Assessment Service, will help you develop procedures and tools to assess vendor risk.

Build a Vendor Security Assessment Service – Phase 3: Deploy and Monitor Process

This phase of the blueprint, Build a Vendor Security Assessment Service, will help you implement the process and develop metrics to measure effectiveness.

Develop and Implement a Security Incident Management Program – Phase 1: Prepare

Prepare your organization for incident response with formal documentation of policies and processes, and a list of prioritized incidents.

Develop and Implement a Security Incident Management Program – Phase 3: Maintain and Optimize

Maintain and optimize the incident management process by tracking metrics, performing tabletop exercises, and leveraging best practices.

Develop and Implement a Security Incident Management Program – Phase 2: Operate

Operate with efficiency and effectiveness as new incidents are handled.

Develop and Implement a Security Incident Management Program – Phases 1-3

Effective and efficient management of incidents involves a formal process of preparation, detection, analysis, containment, eradication, recovery, and post-incident...

Design a Coordinated Vulnerability Disclosure Program – Phases 1-2

This storyboard will help you develop a methodology for receiving vulnerability reports from external parties.

Design a Coordinated Vulnerability Disclosure Program – Phase 1: Assess Goals

This phase of the blueprint, Assess Goals, will help you identify business requirements, customer expectations, and compliance obligations for the coordinated...

Design a Coordinated Vulnerability Disclosure Program – Phase 2: Formalize the Program

This phase of the blueprint, Formalize the Program, will help you create a coordinated vulnerability disclosure policy and plan.

Implement Risk-Based Vulnerability Management – Phases 1-4

This is the main storyboard of a risk-based approach to vulnerability management and the reduction of your risk surface.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us