Templates & Policies

Workshop Summary Presentation Template

Use this template to summarize the vendor selection process that supports the AI proof of value project.

Security Incident Management Runbook: Ransomware

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Security Incident Management Runbook: Third-Party Incident

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

AI Deployment Plan Report Template

Finalize a report for your leadership on what your AI implementation and scaling plan can look like.

Security Incident Management Runbook: Malware

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Security Incident Management Runbook: Data Breach

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Security Incident Management Runbook: Distributed Denial of Service

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.ni

Security Incident Management Runbook: Credential Compromise

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Security Incident Management Runbook: Malicious Email

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Technology Service Provider Industry Business Reference Architecture Template

Use this template as a starting point to develop your own custom capability map.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us