Security Risk, Strategy & Governance - Templates & Policies

Preshopping Security Budget Presentation Template

This template will help you build a presentation in order to perform “preshopping” with stakeholders. Preshopping is when you speak with stakeholders prior to the final...

Final Security Budget Presentation Template

This template will help you build a final budget presentation that you can deliver to stakeholders to gain final budgetary approval.

Security Component Maturity Level Descriptions

This document provides different maturity level descriptions for each security component that makes up the Info-Tech Information Security Framework.

Security Operations Policy for Third-Party Outsourcing

Ensure secure operations of information processing with regards to implementation of an external third party.

Third-Party Security Policy Charter Template

Make sure you that your desire to outsource matches your organization's security mandate.

Security Governance Organizational Structure

A formalized security organizational structure assigns and defines the security roles and responsibilities of different members in the organization. Clarity of...

Information Acceptable Use Policy

The information acceptable use policy outlines standards for appropriate use of corporate information and IT equipment.

CISO Stakeholder Power Map Template

Identify and manage key stakeholders to improve your relationships within the organization.

Privacy Notice Template – External Facing

Use this external-facing template to customize a privacy notice that provides users with a comprehensive understanding of how you process their personal data, why, and...

Cookie Policy Template – External Facing

Use this external-facing template to customize a cookie policy that provides users with a clear and comprehensive understanding of what cookies are, how they are...
GET HELP Contact Us
×
VL Methodology