Small Enterprise Resources

Build an IT Strategy for Small Enterprises – Phases 1-3

Small enterprise IT leaders must understand both business and IT in terms of goals, capabilities, and initiatives to effectively build and execute a roadmap.

Small Enterprise Information Security Program Gap Analysis Tool

This tool will help you assess your current state information security practice and build a roadmap to reach your target state.

Security Incident Management Policy

The purpose of this policy is to ensure proper recognition, management, and communication of security events and weaknesses through a formal process.

Vendor Classification Tool

This tool will classify your vendors according to Info-Tech's best practice C.O.S.T. quadrant.

Vendor Information Sheet

This template gives you a place to consolidate all your vendor information, including escalation chains, issues logs, transition in/out considerations, and TCO.

Vendor Management Program Plan

Use this template to document the inner workings of your VMO.

Vendor Review Meeting Agenda Template

Use this template to guide review meetings with your vendor.

Security Risk Register Tool

This tool will allow you to collect, analyze, and combine individual risks and view the aggregate level of risk within the organization, including how it compares to your...

Information Security Program Gap Analysis Tool

To enable an effective security program, all areas of security need to be evaluated closely to determine where the organization sits currently and where it needs to go to...

Modernize Your Microsoft Licensing for the Cloud Era – Phase 4: Manage, Review, and Assess Compliance

This phase of the blueprint will examine management of licenses and license compliance.
GET HELP Contact Us
×
VL Methodology