Security Risk, Strategy & Governance - Templates & Policies

Anti-Virus Policy

The anti-virus policy provides a computing network that is virus-free; this policy provides instructions on measures that must be taken by company employees to help...

CISO Stakeholder Power Map Template

Identify and manage key stakeholders to improve your relationships within the organization.

CISO Stakeholder Management Strategy Template

Once you have completed the CISO Stakeholder Power Map activity, use this tool to create a strategy to cultivate your stakeholder relationships, and manage each...

CISO Development Plan Template

Once you have assessed your competency, process, and technology gaps, use this tool to set goals and create an action plan to remediate any gaps.

Risk Management Program Manual

Formalizing a risk management program requires creating repeatable and iterative processes, and documenting best practices. Create a comprehensive manual to serve as the...

Risk Event Action Plan

Integrate IT risk management with business risk management by creating a paper trail for key risks.

Risk Report

Create a succinct, impactful document that summarizes the outcomes from the risk assessment and highlights the IT risk council’s top recommendations to the senior...

Compliance Business Case Template

This template will allow you to plan your security compliance management for HIPAA and/or SOX. Document your goals, objectives, and other project steps in this template...

Mitigation Effectiveness and Gap Initiative Communication Deck

Use this template to present the results of your mitigation effectiveness assessment to your stakeholders.

Preshopping Security Budget Presentation Template

This template will help you build a presentation in order to perform “preshopping” with stakeholders. Preshopping is when you speak with stakeholders prior to the final...
GET HELP Contact Us
×
VL Methodology