|
Use this template to document the overall process and structure of your security risk assessment program.
|
|
|
Identify relevant metrics to assist in evaluating the success of your organization's endpoint protection process.
|
|
|
Info-Tech's Data Protection Policy template is for internal use and ensures that data privacy best practices are supported and enforced within the organization.
|
|
|
A charter is the organizational mandate that outlines the purpose, scope, and authority of the Information Security Steering Committee.
|
|
|
Use this template to develop a comprehensive user-facing acceptable use policy to formalize various aspects of security that are relevant to your end users.
|
|
|
Use this template to build your information security risk management process.
|
|
|
Formalize your security awareness and training program into a policy to ensure that your employees are held accountable.
|
|
|
Use the Information Security Strategy Communication Deck to present the results of the security strategy to stakeholders, and show how the security program will improve...
|
|
|
This template will help you to implement or revise your organizational structure.
|
|
|
Use this template to describe the activities and responsibilities required to effectively respond to a discovery request.
|
|