Topics
-
CIO1404
-
Infrastructure & Operations1808
-
Enterprise Architecture717
-
Applications1368
-
Project & Portfolio Management627
-
Data & Business Intelligence589
-
Security940
-
Vendor Management612
-
Templates & Policies163
-
-
Application Development19
-
Budgeting/Procurement14
-
Collaboration2
-
Communications4
-
Data & Digital Assets15
-
Department Governance27
-
Desktop Systems5
-
Disaster & Continuity11
-
Email & Messaging4
-
End-User Support4
-
Enterprise Applications14
-
Hardware17
-
HR Management10
-
Mobile & Wireless12
-
Network Management4
-
Operating Systems1
-
Operations13
-
Project Management19
-
Security37
-
Small Business Essentials9
-
Small Business Extras3
-
Storage8
-
Web Site Development4
-
Types of Content
Personnel Security Policy – NISTUse Info-Tech's Personnel Security Policy to document the personnel requirements prior to and during employment. |
|
Physical Protection Policy – NISTUse Info-Tech's Physical Security Policy to outline the measures taken to protect physical security. |
|
Administrative Rights PolicyThe administrative rights policy grants access to individuals’ desktop, laptop, or other end-user devices within a company for those who are qualified and cleared to use... |
|
Anti-Virus PolicyThe anti-virus policy provides a computing network that is virus-free; this policy provides instructions on measures that must be taken by company employees to help... |
|
Application Security Procedural PolicyThe purpose of an application security policy is to guide developers through the software development lifecycle to assure employee access to the computing resources and... |
|
Account Management Procedural PolicyAccount management facilitates and regulates the access of information systems within a company. It establishes standards for administrating and managing accounts. |
|
Password Procedural PolicyPasswords are the primary form of user authentication used to grant access to information systems. To ensure that passwords provide as much security as possible, they... |
|
Identity and Access Management Procedural PolicyThe use of authorization, identification, and authentication controls of identity and access management ensures that only known users make use of information systems... |
|
Compliance Policy – ISOThe purpose of this policy is to ensure proper measures are in place to avoid non-adherence to information security compliance requirements – legal, contractual,... |
|
Cryptography Policy – ISOThe purpose of this policy is to ensure correct use of cryptography to protect the confidentiality, authenticity, and integrity of the organization’s information. |
|