Security Risk, Strategy & Governance - Templates & Policies

Cloud Security Strategy Template

This template, part of the blueprint Build a Cloud Security Strategy, will serve as a repository of information about your approach to securing the cloud.

CISO Diary

Use Info-Tech's CISO Diary to access stakeholder interview questions and to record and summarize your stakeholder interviews.

The First 100 Days as CISO Executive Presentation Example

Use the Executive Presentation Example as a reference to building out The First 100 Days as CISO Executive Presentation Template.

The First 100 Days as CISO Executive Presentation Template

Use Info-Tech's Executive Presentation Template to present your diagnostic report findings and next steps.

Introduction Sheet

Use Info-Tech's Introduction Sheet to create a short communication memo to send to your colleagues on your first day.

Data Protection Policy

Info-Tech's Data Protection Policy template is for internal use and ensures that data privacy best practices are supported and enforced within the organization.

Policy Exception Tracker

Use this tool to help you track ongoing exceptions to your security policies.

Information Security Policy Exception Request Form

Use this template as a means to request and approve proposed exceptions to your security policies.

Security Policy Exception Approval Workflow

Use this workflow to help you formalize and document your policy exception approval process.

Checklist for Securing Remote Workers

Use this checklist to ensure that you are implementing all of the IT security best practices when you are working from home or away from the office.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us