Security - Templates & Policies

Endpoint Protection Metrics Summary Template

Identify relevant metrics to assist in evaluating the success of your organization's endpoint protection process.

Secure Cloud Usage Policy

Use this template to outline how an organization’s end users can securely use cloud services through acceptable usage guidelines.

General Security – User Acceptable Use Policy

Use this template to develop a comprehensive user-facing acceptable use policy to formalize various aspects of security that are relevant to your end users.

Threat and Risk Assessment Process Template

Use this template to document the exact process your organization uses when conducting a threat and risk assessment.

Endpoint Protection Request for Proposal

A request for proposal is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of...

Data Protection Policy

Use Info-Tech's Data Protection Policy to define and document the necessary data privacy and protection controls.

IDPS RFP Template

A Request for Proposal (RFP) is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of...

Risk Assessment Management Using COBIT 5

Engaging with Info-Tech to conduct a COBIT-based operations workshop on risk management was a natural next step.

Information Security Strategy Workbook Template

Clearly identifying and documenting your information security obligations, scope, goals and other pertinent information are essential parts of building and implementing a...

Threat Intelligence Alert Template

An alert educates internal stakeholders on gathered intelligence to better improve operations and guide high-level strategic decisions. It helps to communicate...
GET HELP Contact Us
×
VL Methodology