Security Technology & Operations - Templates & Policies

Physical and Environmental Security Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Network and Communications Security Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Threat Intelligence Malware Runbook Template

Threats can be categorized into runbooks for which a standardized response process can be defined, eliminating inconsistency and ambiguity while increasing operational...

Mobile Device Remote Wipe Waiver Template

Having the ability to remote wipe is one of the most basic tools in IT's arsenal for securing mobile devices. Use this remote wipe waiver template to create a document...

Security Incident Management Plan

Formalize the security incident management program by defining a central, high-level guide to describe goals, roles, and responsibilities, as well as the process that...

Threat Intelligence Alert and Briefing Cadence Schedule Template

Formalize a monthly cadence schedule to actively collaborate both internally and externally with the necessary threat intelligence stakeholders.

IaaS and PaaS Service Level Agreement Template

Use this template to document the specific security requirements of your potential IaaS or PaaS vendor.

Threat Intelligence Policy Template

The purpose of this policy is to set the requirements for proper facilitation and operation of the threat intelligence program.

Risk Assessment Management Using COBIT 5

Engaging with Info-Tech to conduct a COBIT-based operations workshop on risk management was a natural next step.

Endpoint Protection Request for Proposal

A request for proposal is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us