Security Processes & Operations - Templates & Policies

Confidentiality and Non-Disclosure Agreement

Non-disclosure agreements (also known as confidentiality agreements) prohibit the communication of certain non-public business information by individuals. Use this...

North American Electronic Waste Laws

A number of legislative issues can pose a liability to organizations that fail to properly dispose of obsolete computers and other electronic equipment. Use this document...

Risk Assessment Management Using COBIT 5

Engaging with Info-Tech to conduct a COBIT-based operations workshop on risk management was a natural next step.

Internal Controls Communication Plan Template

Internal controls are only as effective as their level of adoption. Use this template to ensure that users are aware and compliant with internal controls.

Internal Controls Monitoring RACI Template

Responsibilities for governance of the internal controls system should be integrated into the risk management and overall governance function of the IT organization. Use...

Internal Controls Self-Assessment Checklist

Self-assessments of the system of internal control should be aligned with the risk assessment process and completed at least annually or upon any major change to the...

Security Metrics Summary Document

Use this template as the one document where your metrics and their definitions live, and update it as needed.

Security Metrics Executive Communications Presentation

Communication is a significant contributor to the success of your metrics program. Make sure you're sharing the metrics that truly matter to business stakeholders.

Information Security Strategy Workbook Template

Clearly identifying and documenting your information security obligations, scope, goals and other pertinent information are essential parts of building and implementing a...

Security Component Maturity Level Descriptions

This document provides different maturity level descriptions for each security component that makes up the Info-Tech Information Security Framework.
GET HELP Contact Us
×
VL Methodology