Build an Information Security Strategy for Small Enterprises

Small enterprises are not exempt from cyberattack. In many cases, they are the primary target. When the responsibilities or leadership in information security are lacking...
  • guided implementation icon

Build an Information Security Strategy for Small Enterprises – Executive Brief

Read this Executive Brief to understand why small enterprises are more vulnerable to cyberattack threats and how to overcome them.

Build an Information Security Strategy for Small Enterprises – Phases 1-3

This storyboard will help you build a right-sized information security strategy for small enterprises

Build an Information Security Strategy for Small Enterprises – Phase 1: Assess Security Requirements

​This phase of the blueprint Build an Information Security Strategy for Small Enterprise will help you determine your security goals, obligations and risk tolerance.

Small Enterprise Information Security Strategy Workbook Template

This template will help you capture the details of your information security strategy and communication to key stakeholders across the organization.

Build an Information Security Strategy for Small Enterprises – Phase 2: Build a Gap Initiative Strategy

This phase of the blueprint Build an Information Security Strategy for Small Enterprise will help you assess your current- and target-state maturity and the initiatives...

Build an Information Security Strategy for Small Enterprises – Phase 3: Prioritize Initiatives and Build a Roadmap

This phase of the blueprint Build an Information Security Strategy for Small Enterprise will help you consolidate your initiatives and build a roadmap to achieve you...

Case Study: Practical, Right-Sized BCP

​Use this example to understand the governance and incident response components of a BCP, and to provide a model to follow for your BCP project.

DRP Workbook

Record DRP information including document storage and contact/role information.

DRP Business Impact Analysis Tool

Determine appropriate recovery time objectives based on the impact of downtime.
GET HELP Contact Us
×
VL Methodology