Use the Information Security Strategy Communication Deck to present the results of the security strategy to stakeholders, and show how the security program will improve...
|
|
Use this template to communicate your initial ideas for a new service to stakeholders before building a comprehensive business case.
|
|
Use flowcharts and checklists to create effective SOP documents.
|
|
Use this template to create a project charter for medium-sized, moderate-risk projects.
|
|
Info-Tech's Security Policy templates allow you to easily develop new policy documents.
|
|
Info-Tech's Security Policy templates allow you to easily develop new policy documents.
|
|
This template is used to consolidate the compliance management initiative for the purpose of tracking and monitoring progress and ensuring accountability.
|
|
This template is used to structure communication related to compliance changes such as new policies, changes to operating procedures, and remedial measures due to...
|
|
Use the Detailed Project Request Form if your intake processes require more friction.
|
|
This advanced guide is designed to assist in establishing and defining the project prioritization process. For organizations that warrant a formal process document, this...
|
|