Security Technology & Operations - Templates & Policies

Ransomware Strategic Plan Summary Document

Use the Ransomware Strategic Plan Summary Document to discuss the preventative, responsive, and recovery measures that need to be implemented in the event of a ransomware...

Penetration Test RFP Template

Use this template to help create a request for proposal (RFP) for a Penetration Test according to your enterprise requirements.

Internet Acceptable Use Policy

Internet usage is both a necessary tool and a potential distraction and security risk. With capabilities of the Internet and users advancing daily, it is important for...

Security Incident Management Runbook: Ransomware

Incidents can be categorized into runbooks where a standardized response process is defined, eliminating inconsistency and ambiguity while increasing operational...

Security Incident Management Runbook: Malware

Incidents can be categorized into runbooks where a standardized response process is defined, eliminating inconsistency and ambiguity while increasing operational...

Security Incident Management Runbook: Third-Party Incident

Use this template to help you develop an incident-specific runbook and accompanying workflows.

Security Incident Management Runbook: Data Breach

Use this template to help you develop an incident-specific runbook and accompanying workflows.

Security Incident Management Runbook: Credential Compromise

Incidents can be categorized into runbooks where a standardized response process is defined, eliminating inconsistency and ambiguity while increasing operational...

Data Breach Reporting Requirements Summary

Use this template to help keep track of your regulatory reporting requirements following a data breach.

Root-Cause Analysis Template

Use this template to help you determine the root-cause of your security incident.
GET HELP Contact Us
×
VL Methodology