91Ƭ

Templates & Policies

BYOD Acceptable Use Policy

The purpose of the BYOD Acceptable Use Policy is to define standards, procedures, and restrictions for end users who are connecting a personally owned device to a company’s...

Security Stack Capability Assessment Report

A concise presentation template designed to give you a detailed snapshot of your security capabilities.

Vendor Security Process Template

Use this Word-based template to manage workflow, RACI matrices, and risk requirements.

Vendor Security Policy Template

This in-depth template will help you tailor your vendor security policy to your organization.

Vendor Security Process Diagram

This visual flowchart will guide you through the steps of engaging with vendors.

Standard End-User Entitlements and Offerings Template

A general-use template for documenting and communicating technology offerings internally.

Enterprise Device Management Strategy Template

An easily customized presentation deck to help build and communicate a clear and compelling strategy document for your key players.

ITAM Demonstration Script Template

Create a demo script to let vendors know what functions are important for your team.

AI Risk Report

Communicate the results of recent risk assessments to the senior leadership team and provide a summary of important AI risk management developments.

AI Risk Action Plan

Establish and track accountability within your department to determine next steps for managing AI risk.
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us