Security - Templates & Policies

Security Risk Management Presentation Template

This template offers a sample presentation of a risk management program, including an overview of the program and major risks.

Security Operations Metrics Summary Document

Identify relevant metrics to assist in evaluating the success of your organization's incident response processes.

Endpoint Protection Request for Proposal

A request for proposal is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of...

Vendor Security Policy Template

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to define policy requirements for vendor security.

Vendor Security Process Template

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, to define your vendor due diligence process.

Vendor Security Process Diagram

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, to create a visual representation of your vendor due diligence process.

Backup and Recovery Service Level Agreement Template

Ensure your designed processes are ready to be employed into the business environment by conducting a series of testing. Use this template to support process owners and...

Security Operations Program Cadence Schedule Template

Formalize a monthly cadence schedule to actively collaborate both internally and externally with the necessary stakeholders.

Security Operations Collaboration Plan

The Security Operations Collaboration Plan identifies opportunities for optimization through collaboration and cross-training.

Risk Assessment Management Using COBIT 5

Engaging with Info-Tech to conduct a COBIT-based operations workshop on risk management was a natural next step.
GET HELP Contact Us
×
VL Methodology