Security Risk, Strategy & Governance - Templates & Policies

CISO Development Plan Template

Once you have assessed your competency, process, and technology gaps, use this tool to set goals and create an action plan to remediate any gaps.

Subject Access Request (SAR) Process Checklist

Use this checklist to validate that you have prepared for all steps of the request process.

Draft Subject Access Request (SAR) Landing Page Template

Use this template to document what will be included on your subject access request landing page.

Subject Access Request (SAR) Procedure

Use this template to build procedures for subject access requests.

Subject Access Request (SAR) – Erasure

Use this example as a starting point to document your subject access request procedure for erasure requests.

Subject Access Request (SAR) – Rectification

Use this example as a starting point to document your subject access request procedure for rectification requests.

Information Security Compliance Template

Use this template to manage your information security compliance requirements.

Security Governance and Management Communication Plan

This template will help you organize your various security communication efforts with different stakeholders.

Data Privacy Program Report

This template outlines the operations of the Data Privacy program by presenting specific metrics across all twelve areas of data privacy, in a digestible and...

Security Awareness and Training Module Builder and Training Schedule

This tool will help you plan out a training schedule for the different end-user groups and the topics that need to be delivered.
GET HELP Contact Us
×
VL Methodology