Security Risk, Strategy & Governance - Templates & Policies

Subject Access Request (SAR) Procedure

Use this template to build procedures for subject access requests.

Security Initiative Skills Guide

Use this template to document future initiatives skill needs.

Employee Monitoring Policy – IT-Facing

Policy notifying employees of any monitoring that takes place on the systems they use.

Employee Monitoring Policy – Employee-Facing

Policy notifying employees of any monitoring that takes place on the systems they use.

Training Materials – Passwords

This is one of eight security awareness and training templates that can be used to educate end users on best practices. This presentation focuses on passwords.

Information Security Governance and Management Business Case

Use this template to justify the business value of implementing or improving a security governance and management program.

Information Security Charter

Without a charter to control and set clear objectives for security, the responsibility of security governance initiatives will likely be undefined within the enterprise,...

Security Governance Organizational Structure Template

This document provides exemplar organizational structure templates, as well as a RACI chart to help the CISO delegate responsibility for initiatives and tasks.

Security Risk Governance Responsibilities and RACI Template

This template will allow you to structure how your risk management groups, including the board of directors and the IT team, will function and own different process areas.

Threat and Risk Assessment Process Template

Use this template to document the exact process your organization uses when conducting a threat and risk assessment.
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP Contact Us
×
VL Methodology