Security - Templates & Policies

Endpoint Protection Vendor Demo Script

This template is designed to provide EPP vendors with a consistent set of instructions, ensuring an objective comparison of product features, all while evaluating ease of...

Data Audit Interview Schedule

​Use the Data Audit Interview Schedule to ensure you organize interviews with the proper data audit participants.

SaaS Service Level Agreement Template

Use this template to document the specific security requirements of your potential SaaS vendor.

Audit Log Review Policy

The audit log review policy will outline the standards across company systems for the review of audit logs.

Internal Controls Communication Plan Template

Internal controls are only as effective as their level of adoption. Use this template to ensure that users are aware and compliant with internal controls.

Internal Controls Self-Assessment Checklist

Self-assessments of the system of internal control should be aligned with the risk assessment process and completed at least annually or upon any major change to the...

Security Metrics Summary Document

Use this template as the one document where your metrics and their definitions live, and update it as needed.

CISO Stakeholder Power Map Template

Identify and manage key stakeholders to improve your relationships within the organization.

CISO Stakeholder Management Strategy Template

Once you have completed the CISO Stakeholder Power Map activity, use this tool to create a strategy to cultivate your stakeholder relationships, and manage each...

Vulnerability Scanning Tool RFP Template

Looking for a vulnerability scanning tool? Use this Request for Proposal (RFP) template to get you started.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us