This template outlines the operations of the Data Privacy program by presenting specific metrics across all twelve areas of data privacy, in a digestible and...
|
|
Use this template to outline your requirements for a data protection officer, in compliance with the GDPR.
|
|
Use this template to set the foundational requirements of data retention within the organization.
|
|
Use Info-Tech's Coordinated Vulnerability Disclosure Policy to specify the parameters of your program.
|
|
Use Info-Tech's Coordinated Vulnerability Disclosure Plan to detail the response procedures of the program.
|
|
Use Info-Tech's Coordinated Vulnerability Disclosure Workflow to visualize the response procedures of the program.
|
|
This tool will help you plan out a training schedule for the different end-user groups and the topics that need to be delivered.
|
|
This template will help you assemble a board-level metrics presentation.
|
|
Communication between security and the rest of the business can be difficult because the two parties often speak different languages. Your security messages should be...
|
|
Use this template to help create a request for proposal (RFP) for a Penetration Test according to your enterprise requirements.
|
|