Security Risk, Strategy & Governance - Templates & Policies

Security Awareness Training Procedural Policy

Formalize your security awareness and training program into a policy to ensure that your employees are held accountable.

Media Protection Procedural Policy

Use Info-Tech's Media Protection Procedural Policy to define the level of protection mechanisms that will exist to protect your media.

IaaS and PaaS Security Communication Deck

Communicating security, especially cloud security, can be a difficult obstacle. This communication deck will provide you with the necessary medium to convey your findings.

Risk Management Program Manual

Formalizing a risk management program requires creating repeatable and iterative processes, and documenting best practices. Create a comprehensive manual to serve as the...

Risk Event Action Plan

Integrate IT risk management with business risk management by creating a paper trail for key risks.

Data Audit Interview Schedule

​Use the Data Audit Interview Schedule to ensure you organize interviews with the proper data audit participants.

IDPS Vendor Demo Script

This template is designed to provide IDPS vendors with a consistent set of instructions, ensuring an objective comparison of product features – all while evaluating ease...

A Guide to Data Subject Access Requests

To enable effective execution of compliance to the GDPR, the Data Subject Access Request procedure within the organization should be aligned to the requirements specified...

Backup and Recovery Service Level Agreement Template

Ensure your designed processes are ready to be employed into the business environment by conducting a series of testing. Use this template to support process owners and...

Legitimate Interest Assessment Template

Perform a legitimate interest assessment when legitimate interest is used as the lawful basis for business processes under GDPR.
GET HELP Contact Us
×
VL Methodology