Security Risk, Strategy & Governance - Templates & Policies

Draft Subject Access Request (SAR) Landing Page Template

Use this template to document what will be included on your subject access request landing page.

Subject Access Request (SAR) Procedure

Use this template to build procedures for subject access requests.

Subject Access Request (SAR) – Erasure

Use this example as a starting point to document your subject access request procedure for erasure requests.

Subject Access Request (SAR) – Rectification

Use this example as a starting point to document your subject access request procedure for rectification requests.

Security Awareness and Training Module Builder and Training Schedule

This tool will help you plan out a training schedule for the different end-user groups and the topics that need to be delivered.

Checklist for Securing Remote Workers

Use this checklist to ensure that you are implementing all of the IT security best practices when you are working from home or away from the office.

Information Security Steering Committee RACI Chart

Use this RACI chart to keep track of responsibility and accountability for tasks related to your Information Security Steering Committee.

Security Policy Hierarchy Diagram

Use this example diagram as a reference to help you categorize and structure your organization's security policies.

Security Governance Model Facilitation Questions

Use these questions to help spur discussion about how your governance will be structured.

Information Security Service Catalog

Use this Security Service Catalog Template to help you track the various services being offered by your security program.
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP Contact Us
×
VL Methodology