SlideShare a Scribd company logo
Save time, save money, and get results
The definitive cyber security risk
assessment tool
www.vigilantsoftware.co.uk
Developed by global
ISO 27001
experts
www.vigilantsoftware.co.uk
Alan Calder Steve Watkins
• Simplifies and speeds up the risk
assessment
• Reduces complexity
• Cuts costs
• Enables ISO 27001 compliance
www.vigilantsoftware.co.uk
vsRisk
www.vigilantsoftware.co.uk
Interactive dashboard
• ISO 27001:2013
• ISO 27001:2005
• NIST SP 800-53
• PCI DSS
• Cloud Controls Matrix
• ISO 27032
• Cyber Essentials
www.vigilantsoftware.co.uk
Seven control sets
www.vigilantsoftware.co.uk
Database of risks/ threats & vulnerabilities
www.vigilantsoftware.co.uk
Built-in sample risk assessment
www.vigilantsoftware.co.uk
Flexible settings
www.vigilantsoftware.co.uk
Customisable
www.vigilantsoftware.co.uk
Easy to use
www.vigilantsoftware.co.uk
Four risk treatment options
Treat
Terminate
Tolerate
Transfer
*When purchased with the ISO 27001 Documentation Toolkit
Integrated documentation templates*
www.vigilantsoftware.co.uk
Three variants
www.vigilantsoftware.co.uk
Six audit-ready reports
• Statement of Applicability
• Risk Treatment Plan
• Risk Assessment Report
• Risk Summary Report
• Controls Usage Report
• Comments Report
www.vigilantsoftware.co.uk
Additional add-ons
Free software updates
and technical support
with an annual support licence.
www.vigilantsoftware.co.uk/t-videos.aspx
www.vigilantsoftware.co.uk
Watch the videos
Contact us for a free personal demo
servicecentre@vigilantsoftware.co.uk

More Related Content

PDF
Maintaining and updating your risk assessment using vsRisk
PDF
Using vsRisk to carry out a risk assessment
PDF
Elastic Security: Enterprise Protection Built on the Elastic Stack
PDF
Elastic Security: Enterprise Protection Built on the Elastic Stack
PPTX
Moving Security to the Left
PDF
Elastic Security: Enterprise Protection Built on the Elastic Stack
PDF
Evident io Continuous Compliance - Mar 2017
PDF
Elastic Security: Enterprise Protection Built on the Elastic Stack
Maintaining and updating your risk assessment using vsRisk
Using vsRisk to carry out a risk assessment
Elastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic Stack
Moving Security to the Left
Elastic Security: Enterprise Protection Built on the Elastic Stack
Evident io Continuous Compliance - Mar 2017
Elastic Security: Enterprise Protection Built on the Elastic Stack

What's hot (20)

PDF
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
PDF
Elastic Security: Protección empresarial basada en Elastic Stack
PDF
The 7 Rules of IT Disaster Recovery by Acronis
PDF
Don’t WannaCry? Here’s How to Stop Those Ransomware Blues
PDF
Elastic SIEM (Endpoint Security)
PPTX
Cyber Security testing in an agile environment
PDF
Open Source Security: How to Lay the Groundwork for a Secure Culture
PDF
Take Control: Design a Complete DevSecOps Program
PDF
Top 5 Data Security Strategies in QA
PDF
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG Effitas
PDF
Top 10 Practices of Highly Successful DevOps Incident Management Teams
DOCX
Top 5 reasons to purchase cisco asa 5500 series
PDF
Keynote: Elastic Security evolution and vision
PDF
Palestra de abertura: Evolução e visão do Elastic Security
PDF
Introduction to Azure Sentinel
PDF
Elastic Security: Proteção Empresarial construída sobre o Elastic Stack
PDF
Ccna sec
PDF
Managing Traceability in an Agile, Safety-critical Development Environment
PPTX
ATAGTR2017 Security Testing for Healthcare applications
PDF
Open Source Security: How to Lay the Groundwork for a Secure Culture
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
Elastic Security: Protección empresarial basada en Elastic Stack
The 7 Rules of IT Disaster Recovery by Acronis
Don’t WannaCry? Here’s How to Stop Those Ransomware Blues
Elastic SIEM (Endpoint Security)
Cyber Security testing in an agile environment
Open Source Security: How to Lay the Groundwork for a Secure Culture
Take Control: Design a Complete DevSecOps Program
Top 5 Data Security Strategies in QA
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG Effitas
Top 10 Practices of Highly Successful DevOps Incident Management Teams
Top 5 reasons to purchase cisco asa 5500 series
Keynote: Elastic Security evolution and vision
Palestra de abertura: Evolução e visão do Elastic Security
Introduction to Azure Sentinel
Elastic Security: Proteção Empresarial construída sobre o Elastic Stack
Ccna sec
Managing Traceability in an Agile, Safety-critical Development Environment
ATAGTR2017 Security Testing for Healthcare applications
Open Source Security: How to Lay the Groundwork for a Secure Culture
Ad

Viewers also liked (17)

PPTX
Cybersecurity Priorities and Roadmap: Recommendations to DHS
PDF
National Cybersecurity - Roadmap and Action Plan
PPTX
Cyber security: A roadmap to secure solutions
PPTX
Roadmap to security operations excellence
PPTX
Information Security Awareness
PPT
Cyber security awareness training by cyber security infotech(csi)
PPT
BASIC IT AND CYBER SECURITY AWARENESS
PDF
Lessons Learned from the NIST CSF
PPT
Roadmap to IT Security Best Practices
PDF
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
PPT
General Awareness On Cyber Security
PDF
Cyber security-report-2017
 
PPT
End User Security Awareness Presentation
PDF
Facilitated Risk Analysis Process - Tareq Hanaysha
PPTX
Basic Security Training for End Users
PPTX
Build an Information Security Strategy
PDF
Building an effective Information Security Roadmap
Cybersecurity Priorities and Roadmap: Recommendations to DHS
National Cybersecurity - Roadmap and Action Plan
Cyber security: A roadmap to secure solutions
Roadmap to security operations excellence
Information Security Awareness
Cyber security awareness training by cyber security infotech(csi)
BASIC IT AND CYBER SECURITY AWARENESS
Lessons Learned from the NIST CSF
Roadmap to IT Security Best Practices
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
General Awareness On Cyber Security
Cyber security-report-2017
 
End User Security Awareness Presentation
Facilitated Risk Analysis Process - Tareq Hanaysha
Basic Security Training for End Users
Build an Information Security Strategy
Building an effective Information Security Roadmap
Ad

Similar to Introducing vsRisk 2.6 (20)

PDF
Maintaining and updating your risk assessment using vsRisk
PPTX
5 Steps to Reduce Your Window of Vulnerability
PDF
Why ISO27001/ISO27005 for my organisation
PDF
Discover an IT Infrastructure Services & Management
PDF
Why ISO27001 For My Organisation
PPTX
VMware overview presentation by alamgir hossain
PDF
The Importance of Risk Management
PDF
It Infrastructure Security - 24x7 Security Monitoring
PDF
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
PDF
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
PDF
What is this DevOps thing and why do I need it?
PPTX
CollabDays Bletchley Park 2024 - Compliance Manager
PDF
Standards for protection of data on storage device are emerging from both the...
PDF
Introducing a Security Feedback Loop to your CI Pipelines
PPTX
Syncsort’s Latest HA Innovations and Security Integration
PPT
Instek digital the vision of future
PDF
Vindicator Overview
PPTX
VMworld 2016 Recap
PPTX
Amplexor Drupal for the Enterprise seminar - Acquia: dream it, Drupal it
PPTX
Achieving DevSecOps Outcomes with Tanzu Advanced - Spanish
Maintaining and updating your risk assessment using vsRisk
5 Steps to Reduce Your Window of Vulnerability
Why ISO27001/ISO27005 for my organisation
Discover an IT Infrastructure Services & Management
Why ISO27001 For My Organisation
VMware overview presentation by alamgir hossain
The Importance of Risk Management
It Infrastructure Security - 24x7 Security Monitoring
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
What is this DevOps thing and why do I need it?
CollabDays Bletchley Park 2024 - Compliance Manager
Standards for protection of data on storage device are emerging from both the...
Introducing a Security Feedback Loop to your CI Pipelines
Syncsort’s Latest HA Innovations and Security Integration
Instek digital the vision of future
Vindicator Overview
VMworld 2016 Recap
Amplexor Drupal for the Enterprise seminar - Acquia: dream it, Drupal it
Achieving DevSecOps Outcomes with Tanzu Advanced - Spanish

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Electronic commerce courselecture one. Pdf
PPTX
Cloud computing and distributed systems.
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Advanced Soft Computing BINUS July 2025.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Big Data Technologies - Introduction.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Advanced methodologies resolving dimensionality complications for autism neur...
NewMind AI Weekly Chronicles - August'25 Week I
NewMind AI Monthly Chronicles - July 2025
Unlocking AI with Model Context Protocol (MCP)
Electronic commerce courselecture one. Pdf
Cloud computing and distributed systems.
The Rise and Fall of 3GPP – Time for a Sabbatical?
Advanced Soft Computing BINUS July 2025.pdf
Review of recent advances in non-invasive hemoglobin estimation
Dropbox Q2 2025 Financial Results & Investor Presentation
Reach Out and Touch Someone: Haptics and Empathic Computing
Big Data Technologies - Introduction.pptx
Spectral efficient network and resource selection model in 5G networks
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
MYSQL Presentation for SQL database connectivity
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton

Introducing vsRisk 2.6