Security Technology & Operations - Templates & Policies

Security Policy Lifecycle Template

The Security Policy Lifecyle is the “policy of policies” which outlines the various steps in a security policy program and shows the high-level security governance within...

Mobile Device Remote Wipe Waiver Template

Having the ability to remote wipe is one of the most basic tools in IT's arsenal for securing mobile devices. Use this remote wipe waiver template to create a document...

Vulnerability Scanning Tool RFP Template

Looking for a vulnerability scanning tool? Use this Request for Proposal (RFP) template to get you started.

Penetration Test RFP Template

Looking to engage a vendor for a Penetration Test? Use this Request for Proposal (RFP) template to get you started.

Vulnerability Management Workflow

The workflows in the Standard Operating Procedure are provided in this raw working file for you to edit as needed.

Vulnerability Management SOP Template

As you are defining or improving your process, be sure to document it. This template provides a starting point in maintaining a detailed standard operating procedure.

Ransomware Readiness Summary Presentation Template

Summarize your organization's current readiness and present a prioritized project roadmap to improve ransomware prevention and recovery capabilities.

Cloud Security Strategy Template

This template, part of the blueprint Build a Cloud Security Strategy, will serve as a repository of information about your approach to securing the cloud.

Coordinated Vulnerability Disclosure Workflow

Use Info-Tech's Coordinated Vulnerability Disclosure Workflow to visualize the response procedures of the program.

Coordinated Vulnerability Disclosure Policy

Use Info-Tech's Coordinated Vulnerability Disclosure Policy to specify the parameters of your program.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us