Topics
-
CIO1406
-
Infrastructure & Operations1838
-
Enterprise Architecture714
-
Applications1374
-
Project & Portfolio Management628
-
Data & Business Intelligence600
-
Security949
-
Vendor Management612
-
Templates & Policies163
-
-
Application Development19
-
Budgeting/Procurement14
-
Collaboration2
-
Communications4
-
Data & Digital Assets15
-
Department Governance27
-
Desktop Systems5
-
Disaster & Continuity11
-
Email & Messaging4
-
End-User Support4
-
Enterprise Applications14
-
Hardware17
-
HR Management10
-
Mobile & Wireless12
-
Network Management4
-
Operating Systems1
-
Operations13
-
Project Management19
-
Security37
-
Small Business Essentials9
-
Small Business Extras3
-
Storage8
-
Web Site Development4
-
Equipment Use PolicyThe equipment use policy has been designed to inform employees/end users of best practices and policies to protect company-owned equipment and sensitive data stored on... |
|
Contingency Planning Procedural PolicyContingency plans are used to establish how information systems will continue to operate in the event of a catastrophic failure of the system or associated components. |
|
SIEM RFP TemplateUse this template to help create a request for proposal (RFP) for a Security Information & Event Management (SIEM) solution according to your enterprise requirements. |
|
ESG Business Case and Operations PlanThe Email Security Gateway (ESG) Business Case & Operations Plan acts as a reference guide for information gathered during the Select and Implement an Email Security... |
|
DRP Test WorksheetDon't wait until disaster recovery (DR) is invoked to discover weaknesses in DR processes. Run a full test of the enterprise DR plan to uncover flaws before an event... |
|
Web Content Filter Test ChecklistWhen testing a web content filter in-house, the process must be scripted and stringent to ensure fair scores across every product tested. Use this template to reduce the... |
|
Acceptable Usage Policy TemplateAcceptable usage policies clearly indicate what information system users are and are not allowed to do. Without these policies, the potential exists that users could... |
|