Templates & Policies

Information Security Policy Exception Request Form

Use this template as a means to request and approve proposed exceptions to your security policies.

Infrastructure Flow Maps and Transaction Profiles

Visualize the interdependencies of your applications and its underlining infrastructure. These visual documents will support the team during performance issue...

ECM Governance Model Charter Template

This charter serves as the central document that contains all the details pertaining to your ECM governance program.

Security Policy Exception Approval Workflow

Use this workflow to help you formalize and document your policy exception approval process.

RFP Evaluation Guidebook

Use this tool as template to guide your evaluation team in the methodology, process, and procedures for evaluating the RFP responses.

Shared Services Implementation Executive Presentation

Leverage this template to create a communication deck to CXOs during and after implementing shared services.

DR Solution Executive Presentation Template

Garner executive buy-in by clearly documenting the DR solution analysis process and establish a strong business case for any investments.

UCaaS Vendor Demo Script

When a shortlist of Unified Communication as a Service vendors has been created and it is time to have them demonstrate their solution, there is a need for a consistent...

Facilitator’s Insight Handbook

Once the performance baseline has been established, the next step is to engage the production and application teams to determine next steps. Capture the key discussion...

Security Incident Management Runbook: Data Breach

Use this template to help you develop an incident-specific runbook and accompanying workflows.
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP Contact Us
×
VL Methodology