Security Risk, Strategy & Governance - Templates & Policies

Subject Access Request (SAR) Process Checklist

Use this checklist to validate that you have prepared for all steps of the request process.

Information Security Steering Committee RACI Chart

Use this RACI chart to keep track of responsibility and accountability for tasks related to your Information Security Steering Committee.

Data Classification Program Communication Deck

Use this comprehensive deck to set out and clearly communicate your data classification plan to stakeholders and decision-makers to build support.

Security Awareness and Training Module Builder and Training Schedule

This tool will help you plan out a training schedule for the different end-user groups and the topics that need to be delivered.

Information Security Policy Exception Request Form

Use this template as a means to request and approve proposed exceptions to your security policies.

Employee Monitoring Policy – IT-Facing

Policy notifying employees of any monitoring that takes place on the systems they use.

Subject Access Request (SAR) Procedure

Use this template to build procedures for subject access requests.

Employee Monitoring Policy – Employee-Facing

Policy notifying employees of any monitoring that takes place on the systems they use.

Policy Exception Tracker

Use this tool to help you track ongoing exceptions to your security policies.

Mock Spear Phishing Email Examples

This document contains numerous mock spear phishing email examples that can be used to test end users’ susceptibility to such attacks.
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us