Small Enterprise Resources

Security Incident Management Policy

The purpose of this policy is to ensure proper recognition, management, and communication of security events and weaknesses through a formal process.

Vendor Classification Tool

This tool will classify your vendors according to Info-Tech's best practice C.O.S.T. quadrant.

Vendor Information Sheet

This template gives you a place to consolidate all your vendor information, including escalation chains, issues logs, transition in/out considerations, and TCO.

Vendor Management Program Plan

Use this template to document the inner workings of your VMO.

Vendor Review Meeting Agenda Template

Use this template to guide review meetings with your vendor.

Security Risk Register Tool

This tool will allow you to collect, analyze, and combine individual risks and view the aggregate level of risk within the organization, including how it compares to your...

Information Security Program Gap Analysis Tool

To enable an effective security program, all areas of security need to be evaluated closely to determine where the organization sits currently and where it needs to go to...

Modernize Your Microsoft Licensing for the Cloud Era – Phase 2: Evaluate Agreement Options

This phase of the blueprint will examine the different contract options Microsoft offers.

Modernize Your Microsoft Licensing for the Cloud Era – Phase 3: Negotiate and Purchase Licenses

This phase of the blueprint will examine negotiating and purchase strategies.

Modernize Your Microsoft Licensing for the Cloud Era – Phase 4: Manage, Review, and Assess Compliance

This phase of the blueprint will examine management of licenses and license compliance.
GET HELP Contact Us
×
VL Methodology