Security - Templates & Policies

eDiscovery Procedure for Legal Search

Use this template to describe the activities and responsibilities required to effectively respond to a discovery request.

Security Risk Governance Responsibilities and RACI Template

This template will allow you to structure how your risk management groups, including the board of directors and the IT team, will function and own different process areas.

Security Assessment Policy – NIST

Use Info-Tech's Security Assessment Policy to specify the requirements of security assessments and their associated controls.

Information Security Risk Management Template

Use this template to build your information security risk management process.

Threat Intelligence Alert and Briefing Cadence Schedule Template

Formalize a monthly cadence schedule to actively collaborate both internally and externally with the necessary threat intelligence stakeholders.

Mobile Device Remote Wipe Waiver Template

Having the ability to remote wipe is one of the most basic tools in IT's arsenal for securing mobile devices. Use this remote wipe waiver template to create a document...

Security Incident Management Plan

Formalize the security incident management program by defining a central, high-level guide to describe goals, roles, and responsibilities, as well as the process that...

Access Control Policy – ISO

The purpose of this policy is to ensure users have the appropriate access levels specifically authorized to them to access information on systems and applications.

Incident Response Policy – NIST

Use Info-Tech's Incident Response Policy to specify the parameters of your incident response program.

Contingency Planning Procedural Policy

Contingency plans are used to establish how information systems will continue to operate in the event of a catastrophic failure of the system or associated components.
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP Contact Us
×
VL Methodology