Security Technology & Operations - Templates & Policies

Ransomware Strategic Plan Summary Document

Use the Ransomware Strategic Plan Summary Document to discuss the preventative, responsive, and recovery measures that need to be implemented in the event of a ransomware...

Security Metrics Executive Communications Presentation

Communication is a significant contributor to the success of your metrics program. Make sure you're sharing the metrics that truly matter to business stakeholders.

Privileged Access Management (PAM) Vendor Demo Script

Use this demonstration script to provide Privileged Access Management (PAM) solution vendors with a consistent set of instructions, ensuring an objective comparison of...

Penetration Test RFP Template

Use this template to help create a request for proposal (RFP) for a Penetration Test according to your enterprise requirements.

Vulnerability Management Policy

This template will allow you to create a vulnerability management policy, which includes scope of the program and the high-level remediation process.

Security Incident Management Runbook: Third-Party Incident

Use this template to help you develop an incident-specific runbook and accompanying workflows.

Security Incident Management Runbook: Data Breach

Use this template to help you develop an incident-specific runbook and accompanying workflows.

Data Breach Reporting Requirements Summary

Use this template to help keep track of your regulatory reporting requirements following a data breach.

Root-Cause Analysis Template

Use this template to help you determine the root-cause of your security incident.

Security Incident Report Template

Use this template to create a high-level summary of security incidents.
GET HELP Contact Us
×
VL Methodology