Topics
-
CIO332
-
Infrastructure & Operations362
-
Enterprise Architecture239
-
Applications273
-
Project & Portfolio Management169
-
Data & Business Intelligence133
-
Security202
-
Vendor Management99
-
Templates & Policies168
-
-
Application Development20
-
Budgeting/Procurement14
-
Collaboration2
-
Communications4
-
Data & Digital Assets15
-
Department Governance31
-
Desktop Systems6
-
Disaster & Continuity12
-
Email & Messaging4
-
End-User Support6
-
Enterprise Applications20
-
Hardware19
-
HR Management11
-
Mobile & Wireless13
-
Network Management5
-
Operating Systems1
-
Operations13
-
Project Management24
-
Security38
-
Small Business Essentials9
-
Small Business Extras4
-
Storage7
-
Web Site Development4
-
Types of Content
Acceptable Usage Policy TemplateAcceptable usage policies clearly indicate what information system users are and are not allowed to do. Without these policies, the potential exists that users could... |
|
Web Content Filter Test ChecklistWhen testing a web content filter in-house, the process must be scripted and stringent to ensure fair scores across every product tested. Use this template to reduce the... |
|
Internet Acceptable Use and Filtering PolicyAll enterprises utilizing a web content filter must guide the productive use of Internet services through Internet Acceptable Use and Filtering Policies. Use this... |
|
DRP Test WorksheetDon't wait until disaster recovery (DR) is invoked to discover weaknesses in DR processes. Run a full test of the enterprise DR plan to uncover flaws before an event... |
|
ESG Business Case and Operations PlanThe Email Security Gateway (ESG) Business Case & Operations Plan acts as a reference guide for information gathered during the Select and Implement an Email Security... |
|
SIEM RFP TemplateUse this template to help create a request for proposal (RFP) for a Security Information & Event Management (SIEM) solution according to your enterprise requirements. |
|
Contingency Planning Procedural PolicyContingency plans are used to establish how information systems will continue to operate in the event of a catastrophic failure of the system or associated components. |
|
Equipment Use PolicyThe equipment use policy has been designed to inform employees/end users of best practices and policies to protect company-owned equipment and sensitive data stored on... |
|
System Change Control Procedural PolicyConfiguration change control involves the systematic proposal, justification, implementation, test/evaluation, review, and disposition of changes to information systems,... |
|
Systems Monitoring and Auditing Procedural PolicySystem monitoring and auditing is used to determine if inappropriate actions have occurred within an information system. System monitoring is used to look for these... |
|