91ÖÆÆ¬³§

Tagged - cyber security

Security Policy Lifecycle Template for Government

Use this template to build and manage your agency’s security policy lifecycle.

Security Compliance Management Tool

Use this tool to track your security compliance management framework and program.

Security Policy Exception Request Form for Government

Use this template as a means to request and approve proposed exceptions to your security policies.

Security Governance & Management Model Tool for Government

This tool will help you determine governance and management accountabilities and responsibilities and use them to build a visual governance and management model.

Policy Exception Tracker for Government

Use this tool to help you track ongoing exceptions to your security policies.

Security Policy Exception Approval Workflow for Government

Use this workflow to help you formalize and document your policy exception approval process.

Threat Landscape Briefing – October 2024

This monthly recording covers topics such as cyberthreat trends, nation states, cybercriminal and hacktivist campaigns, data breaches, control strategies, and exposure to...

IAM RACI

Use this tool to document the roles and responsibilities associated with managing identities and access in your organization.

IAM Program Requirements Gathering Tool

Use this tool to document the overall business, security, and privacy requirements related to your identity and access management program.

Develop a Comprehensive IAM Improvement Strategy

Define a clear IAM strategy that aligns with your organization’s security objectives and regulatory requirements; outlines the goals, roadmap, and desired outcomes of the...
  • guided implementation icon
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us