Security - Templates & Policies

Checklist for Securing Remote Workers

Use this checklist to ensure that you are implementing all of the IT security best practices when you are working from home or away from the office.

Security Operations Policy

The purpose of this policy is to set the requirements for proper facilitation and operation of the security operations program.

Security Operations Project Charter Template

Management buy-in is key to establishing an effective next-generation security operations program. The approval indicates that security is top-of-mind and that the...

Security Operations MSSP RFP Template

An RFP is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of requirements.

Security Operations Metrics Summary Document

Identify relevant metrics to assist in evaluating the success of your organization's incident response processes.

Ransomware Strategic Plan Summary Document

Use the Ransomware Strategic Plan Summary Document to discuss the preventative, responsive, and recovery measures that need to be implemented in the event of a ransomware...

Penetration Test RFP Template

Use this template to help create a request for proposal (RFP) for a Penetration Test according to your enterprise requirements.

Internet Acceptable Use Policy

Internet usage is both a necessary tool and a potential distraction and security risk. With capabilities of the Internet and users advancing daily, it is important for...

End-User Security Knowledge Test Template

This template provides example survey questions to ask an organization’s end users to assess their current level of understanding of security topics and organizational...

Security Awareness and Training Feedback Template

This template will provide you with example survey questions to ask an organization’s end users in order to collect feedback on security training.
GET HELP Contact Us
×
VL Methodology