91Ƭ

Templates & Policies

BYOD Acceptable Use Policy

The purpose of the BYOD Acceptable Use Policy is to define standards, procedures, and restrictions for end users who are connecting a personally owned device to a company’s...

Security Stack Capability Assessment Report

A concise presentation template designed to give you a detailed snapshot of your security capabilities.

Vendor Security Process Template

Use this Word-based template to manage workflow, RACI matrices, and risk requirements.

Vendor Security Policy Template

This in-depth template will help you tailor your vendor security policy to your organization.

Vendor Security Process Diagram

This visual flowchart will guide you through the steps of engaging with vendors.

Standard End-User Entitlements and Offerings Template

A general-use template for documenting and communicating technology offerings internally.

ITAM Demonstration Script Template

Create a demo script to let vendors know what functions are important for your team.

Enterprise Device Management Strategy Template

An easily customized presentation deck to help build and communicate a clear and compelling strategy document for your key players.

AI Risk Action Plan

Establish and track accountability within your department to determine next steps for managing AI risk.

AI Risk Management Roadmap Presentation Template

AI Risk Management Roadmap Presentation Template
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us