Security Technology & Operations - Templates & Policies

Ransomware Response Runbook Template

Use this example as a starting point to document detailed ransomware response steps, from detection to recovery.

Ransomware Tabletop Planning Results – Example

Leverage tabletop planning to develop an effective and practical response plan that captures the steps staff in your organization would need to execute to prevent and...

Ransomware Resilience Summary Presentation

Summarize your organization's current resilience and present a prioritized project roadmap to improve ransomware prevention and recovery capabilities.

Tabletop Exercise – Extended (Ransomware Template)

Adapt this tabletop planning session template to plan and practice the response of your leadership team to a ransomware scenario.

Security Policy Lifecycle Template

The Security Policy Lifecyle is the “policy of policies” which outlines the various steps in a security policy program and shows the high-level security governance within...

Mobile Device Remote Wipe Waiver Template

Having the ability to remote wipe is one of the most basic tools in IT's arsenal for securing mobile devices. Use this remote wipe waiver template to create a document that...

Vulnerability Scanning Tool RFP Template

Looking for a vulnerability scanning tool? Use this Request for Proposal (RFP) template to get you started.

Penetration Test RFP Template

Looking to engage a vendor for a Penetration Test? Use this Request for Proposal (RFP) template to get you started.

Vulnerability Management SOP Template

As you are defining or improving your process, be sure to document it. This template provides a starting point in maintaining a detailed standard operating procedure.

Vulnerability Management Workflow

The workflows in the Standard Operating Procedure are provided in this raw working file for you to edit as needed.
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us