Use this template to manage your information security compliance requirements.
|
|
This template will help you organize your various security communication efforts with different stakeholders.
|
|
Communication between security and the rest of the business can be difficult because the two parties often speak different languages. Your security messages should be...
|
|
This document contains numerous mock spear phishing email examples that can be used to test end users’ susceptibility to such attacks.
|
|
Looking to engage a vendor for a Penetration Test? Use this Request for Proposal (RFP) template to get you started.
|
|
Info-Tech's Security Policy templates allow you to easily develop new policy documents.
|
|
An RFP is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of requirements.
|
|
Use this template to outline your requirements for a data protection officer, in compliance with the GDPR.
|
|
Use this template to set the foundational requirements of data retention within the organization.
|
|
Policy notifying employees of any monitoring that takes place on the systems they use.
|
|