Effective data security involves many moving parts, and will require support from a number of key individuals within the organization. The Data Security Technical Report...
|
|
Use this template to help document your information security compliance management program.
|
|
Plot your findings from the Workbook and Archive Document to see the current state of your cloud security architecture, the risks, and where you still need to go.
|
|
Use this template to manage your information security compliance requirements.
|
|
This template will help you organize your various security communication efforts with different stakeholders.
|
|
Communication between security and the rest of the business can be difficult because the two parties often speak different languages. Your security messages should be...
|
|
Looking to engage a vendor for a Penetration Test? Use this Request for Proposal (RFP) template to get you started.
|
|
Info-Tech's Security Policy templates allow you to easily develop new policy documents.
|
|
An RFP is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of requirements.
|
|
Use this template to outline your requirements for a data protection officer, in compliance with the GDPR.
|
|