Security Technology & Operations - Templates & Policies

Security Incident Management Runbook: Credential Compromise

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

Security Operations Program Cadence Schedule Template

Formalize a monthly cadence schedule to actively collaborate both internally and externally with the necessary stakeholders.

Security Operations Collaboration Plan

The Security Operations Collaboration Plan identifies opportunities for optimization through collaboration and cross-training.

Tabletop Exercises Package

Test your incident response communications plan by running these sample scenarios.

Cloud Security Communication Deck

Use this template to outline the organization’s security understanding and requirements of the proposed cloud migration.

Internal Controls Monitoring RACI Template

Responsibilities for governance of the internal controls system should be integrated into the risk management and overall governance function of the IT organization. Use...

Vendor Security Process Diagram

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, to create a visual representation of your vendor due diligence process.

Secure Cloud Usage Policy

Use this template to outline how an organization’s end users can securely use cloud services through acceptable usage guidelines.

Endpoint Protection Request for Proposal

A request for proposal is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of...

Risk Assessment Management Using COBIT 5

Engaging with Info-Tech to conduct a COBIT-based operations workshop on risk management was a natural next step.
Visit our IT Crisis Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us