Topics
-
CIO1396
-
Infrastructure & Operations1808
-
Enterprise Architecture717
-
Applications1368
-
Project & Portfolio Management627
-
Data & Business Intelligence589
-
Security935
-
Vendor Management612
-
Templates & Policies163
-
-
Application Development19
-
Budgeting/Procurement14
-
Collaboration2
-
Communications4
-
Data & Digital Assets15
-
Department Governance27
-
Desktop Systems5
-
Disaster & Continuity11
-
Email & Messaging4
-
End-User Support4
-
Enterprise Applications14
-
Hardware17
-
HR Management10
-
Mobile & Wireless12
-
Network Management4
-
Operating Systems1
-
Operations13
-
Project Management19
-
Security37
-
Small Business Essentials9
-
Small Business Extras3
-
Storage8
-
Web Site Development4
-
Types of Content
SIEM RFP TemplateUse this template to help create a request for proposal (RFP) for a Security Information & Event Management (SIEM) solution according to your enterprise requirements. |
|
Server Configuration PolicyThe server configuration policy establishes the standards, procedures, and restrictions for new servers being installed within the company. |
|
DRP Test WorksheetDon't wait until disaster recovery (DR) is invoked to discover weaknesses in DR processes. Run a full test of the enterprise DR plan to uncover flaws before an event... |
|
Password Procedural PolicyPasswords are the primary form of user authentication used to grant access to information systems. To ensure that passwords provide as much security as possible, they... |
|
Administrative Rights PolicyThe administrative rights policy grants access to individuals’ desktop, laptop, or other end-user devices within a company for those who are qualified and cleared to use... |
|
Removable Media Acceptable Use PolicyThe removable media acceptable use policy defines the standards, procedures, and restrictions for end users who have legitimate business requirements to connect portable... |
|
Anti-Virus PolicyThe anti-virus policy provides a computing network that is virus-free; this policy provides instructions on measures that must be taken by company employees to help... |
|
Instant Messaging Usage and Security PolicyThe instant messaging usage and security policy outlines the standards for the usage of, and security controls associated with, corporate instant messaging. |
|
Equipment Use PolicyThe equipment use policy has been designed to inform employees/end users of best practices and policies to protect company-owned equipment and sensitive data stored on... |
|
Web Content Filter Test ChecklistWhen testing a web content filter in-house, the process must be scripted and stringent to ensure fair scores across every product tested. Use this template to reduce the... |
|