Security - Templates & Policies

Risk Management Program Manual

Formalizing a risk management program requires creating repeatable and iterative processes, and documenting best practices. Create a comprehensive manual to serve as the...

Risk Event Action Plan

Integrate IT risk management with business risk management by creating a paper trail for key risks.

Risk Report

Create a succinct, impactful document that summarizes the outcomes from the risk assessment and highlights the IT risk council’s top recommendations to the senior...

Compliance Business Case Template

This template will allow you to plan your security compliance management for HIPAA and/or SOX. Document your goals, objectives, and other project steps in this template...

IAM Procurement Project Charter Template

Ensure proper project management and stakeholder support from the start of your project by properly planning and scoping your identity and access management solution.

IAM System RFP Template

A request for proposal is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of...

IAM Vendor Demo Script Template

This template is designed to provide IAM vendors with a consistent set of instructions, ensuring an objective comparison of product features – all while evaluating ease...

Security Incident Management Charter Template

Management buy-in is key to effective incident response. The approval indicates that security is top-of-mind and that the process aligns with business objectives....

Mitigation Effectiveness and Gap Initiative Communication Deck

Use this template to present the results of your mitigation effectiveness assessment to your stakeholders.

Threat Intelligence Project Charter Template

Management buy-in is key to establishing an effective threat intelligence program. The approval indicates that security is top-of-mind and that the process aligns with...
GET HELP Contact Us
×
VL Methodology