Topics
-
CIO1396
-
Infrastructure & Operations1808
-
Enterprise Architecture717
-
Applications1368
-
Project & Portfolio Management627
-
Data & Business Intelligence589
-
Security935
-
Vendor Management612
-
Templates & Policies163
-
-
Application Development19
-
Budgeting/Procurement14
-
Collaboration2
-
Communications4
-
Data & Digital Assets15
-
Department Governance27
-
Desktop Systems5
-
Disaster & Continuity11
-
Email & Messaging4
-
End-User Support4
-
Enterprise Applications14
-
Hardware17
-
HR Management10
-
Mobile & Wireless12
-
Network Management4
-
Operating Systems1
-
Operations13
-
Project Management19
-
Security37
-
Small Business Essentials9
-
Small Business Extras3
-
Storage8
-
Web Site Development4
-
Types of Content
System Change Control Procedural PolicyConfiguration change control involves the systematic proposal, justification, implementation, test/evaluation, review, and disposition of changes to information systems,... |
|
Systems Monitoring and Auditing Procedural PolicySystem monitoring and auditing is used to determine if inappropriate actions have occurred within an information system. System monitoring is used to look for these... |
|
BYOC Acceptable Use PolicyThe purpose of the BYOC Acceptable Use Policy is to define standards, procedures, and restrictions for end users who are connecting a personally-owned device to a... |
|
Equipment Use PolicyThe equipment use policy has been designed to inform employees/end users of best practices and policies to protect company-owned equipment and sensitive data stored on... |
|
Mobile Device Connectivity & Allowance PolicyThe mobile device connectivity and allowance policy enables a secure and productive workforce by outlining the policies regarding mobile device connectivity. |
|
Guest Wireless Internet Acceptable Use PolicyThe guest wireless internet acceptable use policy outlines the appropriate and inappropriate use of guest wireless internet resources within a company. |
|
Asset Management Policy – ISOThe purpose of the asset management policy is to ensure assets are identified appropriately and the proper protection controls for those assets are in place. |
|