The PDA usage policy outlines standards for connecting to company network(s) or related technology resources via any means involving mobile devices that are categorized...
|
|
This template is designed to introduce consistency and outline key requirements during the request for proposal (RFP) phase of selecting an MSSP.
|
|
Use this e Information Security Charter to define the scope and purpose of your security program.
|
|
Use this template to describe the activities and responsibilities required to effectively respond to a discovery request.
|
|
Use this template to build your information security risk management process.
|
|
This template will help you to implement or revise your organizational structure.
|
|
Use the Information Security Strategy Communication Deck to present the results of the security strategy to stakeholders, and show how the security program will improve...
|
|
A charter is the organizational mandate that outlines the purpose, scope, and authority of the Information Security Steering Committee.
|
|
Info-Tech's Data Protection Policy template is for internal use and ensures that data privacy best practices are supported and enforced within the organization.
|
|
Once you have assessed your competency, process, and technology gaps, use this tool to set goals and create an action plan to remediate any gaps.
|
|