Use this checklist to validate that you have prepared for all steps of the request process.
|
|
Use this RACI chart to keep track of responsibility and accountability for tasks related to your Information Security Steering Committee.
|
|
Use this comprehensive deck to set out and clearly communicate your data classification plan to stakeholders and decision-makers to build support.
|
|
This tool will help you plan out a training schedule for the different end-user groups and the topics that need to be delivered.
|
|
Use this template as a means to request and approve proposed exceptions to your security policies.
|
|
Policy notifying employees of any monitoring that takes place on the systems they use.
|
|
Use this template to build procedures for subject access requests.
|
|
Policy notifying employees of any monitoring that takes place on the systems they use.
|
|
Use this tool to help you track ongoing exceptions to your security policies.
|
|
This document contains numerous mock spear phishing email examples that can be used to test end users’ susceptibility to such attacks.
|
|