Built for you

For security program managers
who run the programme between assessments and audits

Security program managers hold the security programme together between assessments, audits, and incident response activations. The work covers the programme plan, the RAID log, the dependency map, the governance forum cadence, the RACI for cross-team work, security onboarding for new applications and business units, stakeholder reporting for the steering committee, and the audit-evidence pull for surveillance time. SecPortal pairs engagement records per workstream, findings management with CVSS 3.1 scoring and owner-of-record, compliance tracking across frameworks, document management for plans and RAID logs, AI-assisted reporting, role-based access control, and an append-only activity log on one workspace, so the programme reads from one record rather than from a deck, a wiki, a spreadsheet, and a folder of meeting notes.

No credit card required. Free plan available forever.

A security programme management platform built around the live engagement record

Security program managers (PgMs) and security programme leads carry the rolling state of the security programme between assessments, audits, and incident response activations. The work spans the programme plan, the RAID log, the dependency map, the cross-team RACI, the governance forum cadence, the programme onboarding for new applications and business units, the steering committee report, the programme board pack, the audit committee submission, and the audit-evidence pull for surveillance time. Most programmes carry this work in a Confluence space, a recurring meeting calendar, a Slack channel, a folder of plans and RAID logs, a spreadsheet for the dependency map, a deck for the steering committee, and a separate deck for the audit committee, and pay the cost in reconciliation hours each cycle and in residual programme risk between cycles.

SecPortal gives in-house security program managers one workspace for engagement records per workstream, findings management with CVSS 3.1 scoring and owner-of-record across every source, document management for plans and RAID logs and minutes, compliance tracking that maps one engagement against multiple frameworks at once, AI-assisted programme reporting that regenerates summaries from the live record, role-based access control and multi-factor authentication for the cross-team participants, notifications routing for the recurring cadence, and an append-only activity log that ties the trail together. The programme reads from one record rather than from a deck, a wiki, a spreadsheet, and a folder of meeting notes.

Capabilities security program managers use day to day

One engagement record per workstream

Open an engagement per workstream (programme onboarding, control rollout, audit-readiness cycle, exception sweep, scanner-fleet expansion, business-unit integration, PSIRT-driven response, framework alignment cycle). Scope notes, the workstream plan, the RAID entries, the dependency map, the milestone artefacts, and the forum minutes attach as documents on the engagement record. The programme reads from one workspace rather than from a Confluence space, an inbox, and a calendar.

Findings management with owner-of-record and severity

Every security finding lands on the engagement record with an auto-calculated CVSS 3.1 vector, severity, evidence, named owner, and remediation status. Nessus, Burp Suite, custom CSV exports, code scan results from connected GitHub, GitLab, or Bitbucket repositories, authenticated DAST output, external scanning across 16 modules on the verified perimeter, and manually logged third-party pentest findings consolidate on the same record, so the programme picture reads from one queue.

Cross-framework compliance tracking

Compliance tracking maps findings, controls, and engagement records against ISO 27001 Annex A, SOC 2 Trust Services Criteria, PCI DSS requirements, NIST SP 800-53 control families, NIST CSF 2.0 functions, Cyber Essentials, and the other 21 supported frameworks on the same record. One mapping satisfies multiple audit packs in parallel, so the programme manager does not rebuild the trail per framework each surveillance cycle.

Document management for plans, RAID logs, and minutes

Programme plans, RAID logs, dependency maps, milestone artefacts, governance forum minutes, RACI tables, programme onboarding packs, and stakeholder communications attach to the engagement record with provenance. The programme manager, the workstream owners, the security leader, the steering committee, and the audit observer read the same artefact set rather than three reconciled folders.

AI-assisted programme reporting

Executive summaries, programme-status writeups, remediation roadmaps, decision-record exports, and compliance summaries regenerate from the live engagement data on demand. The steering committee deck, the programme board pack, the audit committee report, and the executive risk forum read from the same record the workstream owners run on, so the leadership view does not drift from operational reality between cycles.

Role-based access control and multi-factor authentication

Role-based access control scopes the security team, the engineering owners, the audit observers, and the steering committee participants to the engagements they actually need. Multi-factor authentication is enforced on every account, so the cross-team access model is enforced by the platform rather than asserted in an onboarding email.

Append-only activity log across the workspace

Every finding update, scan run, document upload, retest run, exception decision, comment, and team change is recorded with the actor, the entity, the timestamp, and the action. Plan retention covers 30, 90, or 365 days, and CSV export keeps the programme trail reproducible at audit time without a multi-team excavation of email and chat history.

Notifications and assignment workflow

Findings, retests, exceptions, document uploads, and team changes can route notifications to named owners, so the programme cadence stays observable between forum cycles rather than living in chase threads. The notifications feed and the activity log give the programme manager one place to read the rolling state of every workstream.

How security program managers operate the programme inside SecPortal

A security programme that holds up under audit, incident review, and steering committee scrutiny operates on a small set of disciplines. Workstream plans, RAID entries, dependencies, cross-team RACI, exception decisions, control mappings, and the audit-evidence trail inherit each one rather than carving out a parallel operating model per artefact.

  • Treat each programme workstream as a structured engagement record rather than as a recurring meeting. Plans, RAID entries, dependencies, milestones, findings, exceptions, and audit-evidence artefacts live on the same record across the lifecycle of the workstream.
  • Capture cross-team RACI on the record rather than in a kickoff slide. Every finding carries a named owner-of-record, role-based access control scopes participants to the engagements they need, and reassignment is a tracked record event rather than an off-cycle Slack thread.
  • Run programme onboarding for new applications, new business units, and acquired companies as a structured engagement that captures asset scope, control set, scanner cadence, framework set, and named owners. The onboarding artefacts seed the recurring operations phase rather than ageing into a folder of slides nobody reopens.
  • Treat the exception register as a queue of dated decisions with named owners and explicit expiry, not as a narrative document. The forum cycle reviews exceptions that are actually due rather than re-debating the same items.
  • Map controls to engagement records once and let the same record produce ISO 27001, SOC 2, PCI DSS, NIST SP 800-53, NIST CSF 2.0, and Cyber Essentials evidence in parallel, so audit cycles read from the same programme trail rather than rebuilding the mapping per framework.
  • Generate the steering committee deck, the programme board pack, the audit committee report, and the executive risk forum view from the live engagement data through AI-assisted reporting, so the leadership view does not drift from operational reality between cycles.
  • Maintain an append-only activity trail across every workstream, every finding, every exception decision, every retest, every document version, and every team change, so the question of why the programme made a specific decision has a single defensible answer at audit time.

From programme plan to audit committee report, on one engagement record

The programme management loop is open the workstream, land the findings, map the controls, record the exceptions, route the cross-team work, generate the leadership view, and read the recurring cadence. SecPortal runs a single workflow that the programme manager, the workstream owners, the security leader, the audit committee, and the engineering owners can all work against without re-keying state into another tool.

  1. 1Open an engagement per programme workstream. Capture the workstream plan, the named owners, the dependency notes, the milestone set, and the governance forum cadence on the engagement record. Attach the RAID log, the RACI table, the onboarding pack, and the stakeholder map as documents. The programme reads from one workspace from the first forum.
  2. 2Land every security finding from across vulnerability management, AppSec, GRC, security engineering, and PSIRT-style intake on the relevant engagement record with auto-calculated CVSS 3.1 vector, severity, evidence, named owner, and remediation status. Scanner imports, code scans, authenticated DAST, external scans, and manually logged third-party pentest findings consolidate on the same record, so the workstream picture reads from one queue.
  3. 3Map findings and controls against ISO 27001 Annex A, SOC 2 Trust Services Criteria, PCI DSS requirements, NIST SP 800-53 control families, NIST CSF 2.0 functions, and the other supported frameworks through compliance tracking. One mapping satisfies multiple audit packs in parallel, so the programme manager does not rebuild the trail per framework each surveillance cycle.
  4. 4Capture risk acceptances, exceptions, and compensating-control decisions on the same record as the findings they cover, with linked finding, severity, compensating controls, residual likelihood, residual impact, business rationale, expiry, and review cadence. The exception register reads as a queue of dated decisions with named owners and explicit expiry rather than as a narrative document the audit committee cannot reconstruct decision chains from.
  5. 5Route the work through role-based access control and multi-factor authentication. Workstream owners, engineering owners, audit observers, and steering committee participants see the engagements they need rather than the entire workspace, so the cross-team access model is enforced by the platform rather than asserted in an onboarding email.
  6. 6Generate the steering committee deck, the programme board pack, the audit committee report, and the executive risk forum view from the live engagement record through AI-assisted reporting. The leadership view regenerates from the same record the workstream owners run on, so the picture does not drift between cycles and the programme manager edits drafts rather than writes the deck from a blank page.
  7. 7Read the recurring cadence from the append-only activity log. Every finding update, scan run, document upload, retest run, exception decision, comment, and team change is recorded with the actor, the timestamp, and the action. Plan retention covers 30, 90, or 365 days, and CSV export keeps the programme trail reproducible at audit time.

Where the programme view connects to the rest of the workspace

Most programme functions adopt SecPortal in three phases: bring every workstream onto an engagement record so the plan, the RAID entries, the dependencies, and the findings live on one record; layer in cross-framework compliance tracking so a single workstream satisfies multiple audit packs; and route the cadence through role-based access control, notifications, and AI-assisted reporting so the steering committee, the programme board, and the audit committee read from the same source the workstream owners run on. The relevant feature, workflow, framework, and blog pages explain each phase in detail.

Where the programme manager role sits next to adjacent personas

Security program managers run the cross-team coordination layer that sits between the executive sponsor (the CISO), the recurring operations cadence (the security operations leader), the per-finding queue (the vulnerability management team), the design-time controls (the security architect), the engineering-side application security work (the AppSec team), and the audit-evidence side (the GRC and compliance team). The programme manager owns the plan, the dependencies, the forum cadence, and the cross-team RACI rather than any one of those operational shapes.

If your function is programme-level executive sponsorship and board-level reporting rather than cross-team programme coordination, the SecPortal for CISOs and security leaders page covers the leadership-tier reporting workflow that sits above the programme manager view.

If a dedicated security operations leader carries the recurring SecOps cadence between the per-finding queue and the programme view, the SecPortal for security operations leaders page covers the operations-leadership tier that pairs scheduled scanning, severity-driven SLAs, exception governance, and the recurring reporting cadence on the same record.

If the day-to-day find-track-fix-verify backlog is owned by a dedicated team, the SecPortal for vulnerability management teams page covers the operator-side workflow that runs underneath the programme manager view.

If your function spans compliance evidence and audit coordination more than cross-team programme management, the SecPortal for GRC and compliance teams page covers the audit-pack workflow that reads from the same engagement record the programme manager operates on.

If your function is the design-time and architecture-review side of the programme rather than the cross-team coordination layer, the SecPortal for security architects page covers the threat modelling, design review, and control-to-architecture mapping workflow.

If the programme is part of a broader internal security operation that also covers incident response and assessments across business units, the SecPortal for internal security teams page covers the wider operational scope on the same workspace.

SecPortal is built for security program managers who want one workspace for the plan-route-track-map-report loop: engagement records per workstream, findings management with owner-of-record across every source, document management for plans and RAID logs and minutes, multi-framework compliance tracking, AI-assisted programme reporting, role-based access control with multi-factor authentication, and an append-only activity log on top. Workstream owners get a clearer signal on the cross-team RACI, security leadership gets a defensible programme posture between cycles, compliance gets reproducible evidence across frameworks, and the programme manager gets back the hours that used to disappear into reconciliation between tools.

The problems you face

And how SecPortal solves each one.

The security programme plan lives in a Confluence page, the RAID log in a separate spreadsheet, milestones in a slide deck, dependencies in an email thread, and the governance forum minutes in a shared drive, so the program manager rebuilds the picture from scratch every steering committee

Open an engagement per workstream (programme onboarding, control rollout, audit-readiness cycle, exception sweep, scanner-fleet expansion, business-unit integration). Plans, RAID entries, dependency notes, milestone artefacts, and forum minutes attach as documents on the engagement record. The programme reads from one workspace, the steering committee reads from the same record the operators run on, and the picture survives staff rotation, tool migrations, and forum chair changes.

Cross-team RACI for security work is asserted in a kickoff slide and never enforced, so the same finding gets routed to three teams, the wrong team owns the remediation, and the program manager spends each forum reassigning work rather than tracking it

Every finding carries an owner-of-record, severity, and remediation status on the engagement record. Role-based access control scopes the security team, the engineering owners, the audit observers, and the steering committee participants to the engagements they actually need. The RACI is enforced by the record rather than asserted in a deck, and reassignment is a tracked record event rather than an off-cycle Slack thread.

Security programme onboarding for new applications, new business units, and acquired companies is a one-off project each time, and the onboarding artefacts never seed the recurring run state, so the operations team inherits a backlog without context six months later

Programme onboarding runs as a structured engagement that captures the asset scope, the control set, the scanner cadence, the audit framework set, and the named owners on one record. The same engagement record carries forward into the recurring operations phase, so the onboarding artefacts become the run-state context rather than a folder of slides the operations team will not reopen.

Steering committee, programme board, and audit committee reporting is a multi-day copy-paste exercise across scanner exports, ticket comments, and last-cycle decks, and the picture reads as point-in-time rather than as the live programme posture

AI-assisted reporting regenerates executive summaries, programme-status writeups, remediation roadmaps, and compliance summaries from the live engagement data on demand. The steering committee deck, the programme board pack, and the audit committee report read from the same record the workstream owners run on, so the leadership view does not drift from operational reality between cycles.

Risk acceptances, exceptions, and compensating-control decisions are stored in narrative documents that the audit committee cannot reconstruct decision chains from, and the same exception gets re-debated each forum cycle

The vulnerability acceptance and exception management workflow captures the linked finding, severity, compensating controls, residual likelihood, residual impact, business rationale, expiry, and review cadence as a structured exception on the same record as the finding. The exception register reads as a queue of dated decisions with named owners and explicit expiry, so the forum cycle reviews exceptions that are actually due rather than re-debating the same items.

Compliance owners ask the program manager for evidence that the programme is operating against ISO 27001, SOC 2, PCI DSS, NIST SP 800-53, NIST CSF 2.0, or sector-specific frameworks, and the team assembles parallel evidence packs from scanner output, ticket comments, and shared drives each cycle

Compliance tracking maps findings, controls, and engagement records against ISO 27001 Annex A, SOC 2 Trust Services Criteria, PCI DSS requirements, NIST SP 800-53 control families, NIST CSF 2.0 functions, Cyber Essentials, and the other 21 supported frameworks on the same record. One mapping satisfies multiple audit packs, and CSV export of findings, control status, and the activity trail is available when the auditor wants the trail in their own format.

The security programme owns dependencies across vulnerability management, AppSec, GRC, security engineering, security operations, and incident response, and the program manager cannot answer in one query which workstream is blocked on which other workstream

Each workstream runs as an engagement record with named owners and explicit status. Cross-workstream dependencies live in the document and comment trail on the engagement, and the activity log records every state change with the actor, the timestamp, and the action. The dependency picture reads from one workspace rather than a multi-team reconciliation exercise.

Audit fieldwork pulls the program manager into a multi-week scramble to assemble evidence from across the programme, and the same evidence is reassembled from scratch next surveillance cycle

Findings, scan executions, exception decisions, retest evidence, document uploads, and the activity log are all captured on the live record across the cycle. Audit fieldwork reads from the same record the workstream owners run on, control crosswalks let one engagement satisfy multiple frameworks at once, and the evidence trail survives staff rotation, scanner version changes, and tool migrations so each surveillance cycle starts further ahead rather than from scratch.

Run the security programme on one record

Engagement records per workstream, RAID log artefacts on document management, cross-framework compliance tracking, AI-assisted steering committee reporting, role-based access control, and an append-only activity log on a single workspace. Free plan available.

No credit card required. Free plan available forever.