Security
Topics
-
CIO1614
-
Infrastructure & Operations1634
-
Enterprise Architecture477
-
Applications1357
-
Project & Portfolio Management577
-
Data & Business Intelligence612
-
Security975
-
Vendor Management500
-
Templates & Policies118
-
-
Application Development11
-
Budgeting/Procurement11
-
Collaboration1
-
Communications3
-
Data & Digital Assets12
-
Department Governance26
-
Desktop Systems4
-
Disaster & Continuity10
-
Email & Messaging4
-
End-User Support4
-
Enterprise Applications10
-
Hardware13
-
HR Management9
-
Mobile & Wireless7
-
Network Management4
-
Operating Systems1
-
Operations11
-
Project Management17
-
Security19
-
Small Business Essentials9
-
Small Business Extras2
-
Storage5
-
Web Site Development4
-
Types of Content
Physical Access PolicyPhysical access controls define who is allowed physical access to facilities that house information systems, and to the information systems within those facilities and/or... |
|
Secure Acquisitions PolicyThe secure acquisitions policy outlines standards for wise acquisitions of information systems in terms of IT security. |
|
Instant Messaging Usage and Security PolicyThe instant messaging usage and security policy outlines the standards for the usage of, and security controls associated with, corporate instant messaging. |
|
Server Configuration PolicyThe server configuration policy establishes the standards, procedures, and restrictions for new servers being installed within the company. |
|
Removable Media Acceptable Use PolicyThe removable media acceptable use policy defines the standards, procedures, and restrictions for end users who have legitimate business requirements to connect portable... |
|
Equipment Use PolicyThe equipment use policy has been designed to inform employees/end users of best practices and policies to protect company-owned equipment and sensitive data stored on... |
|
GPS Cell Phone PolicyThe GPS Cell Phone policy allows employees to do their jobs effectively. This policy supports the guidelines for appropriate use and other administrative issues relating... |
|
DRP Test WorksheetDon't wait until disaster recovery (DR) is invoked to discover weaknesses in DR processes. Run a full test of the enterprise DR plan to uncover flaws before an event... |
|
Web Content Filter Test ChecklistWhen testing a web content filter in-house, the process must be scripted and stringent to ensure fair scores across every product tested. Use this template to reduce the... |
|