Security - Templates & Policies
Topics
Types of Content
Stormfront Shutdown – Simple BCDR ScenarioAn example tabletop scenario that can be used for a tabletop exercise. |
|
Room for Risk – Moderate Security ScenarioAn example tabletop scenario that can be used for a tabletop exercise. |
|
Cross-Network Contagion – Moderate BCDR and Security ScenarioAn example tabletop scenario that can be used for a tabletop exercise. |
|
Silent Intrusion – Complex BCDR and Security ScenarioAn example tabletop scenario that can be used for a tabletop exercise. |
|
Deepfake Disaster – Moderate Security ScenarioAn example tabletop scenario that can be used for a tabletop exercise. |
|
AI Compliance Strategy & Roadmap TemplateClearly articulate the compliance strategy, outcomes, and roadmap to stakeholders, ensuring alignment and buy-in. |
|
Key Stakeholder Engagement PlanUse Info-Tech's Key Stakeholder Engagement Plan to access stakeholder interview questions and to record and summarize your stakeholder interviews. |
|
Application Security Policy TemplateInfo-Tech's Security Policy templates allow you to easily develop new policy documents. |
|
Security Awareness and Training Policy TemplateInfo-Tech's Security Policy templates allow you to easily develop new policy documents. |
|
Security Risk Management Policy TemplateInfo-Tech's Security Policy templates allow you to easily develop new policy documents. |
|