The server configuration policy establishes the standards, procedures, and restrictions for new servers being installed within the company.
|
|
The document retention policy ensures that copies of certain documents for legal, regulatory, and/or operations reasons are made, committing companies to good business...
|
|
Security pressure posture analysis helps your organization assess your real security context and enables your organization to invest in the right security functions while...
|
|
Use this template as the one document where your metrics and their definitions live, and update it as needed.
|
|
This template is designed to provide Security Information & Event Management (SIEM) vendors with a consistent set of instructions to ensure an objective comparison of...
|
|
This tool helps the enterprise determine whether a SIEM solution is appropriate for the organization.
|
|
Lenovo’s strategy to pre-install the Superfish application on some consumer devices was fundamentally irresponsible and a squander of customers’ trust.
|
|
The Data Audit Scorecard identifies the areas in which the health of your data can be modified for improvement. Use this template to see where you fall short so you can...
|
|
This Blueprint will help you establish a well-designed system of internal controls that helps the IT department operate as intended by mitigating its greatest risks.
|
|
This tool will give you an assessment of your current control coverage and help you determine the types of controls required to mitigate your risks.
|
|