|
Use this template to build and manage your agency’s security policy lifecycle.
|
|
|
Use this tool to track your security compliance management framework and program.
|
|
|
Use this template as a means to request and approve proposed exceptions to your security policies.
|
|
|
This tool will help you determine governance and management accountabilities and responsibilities and use them to build a visual governance and management model.
|
|
|
Use this tool to help you track ongoing exceptions to your security policies.
|
|
|
Use this workflow to help you formalize and document your policy exception approval process.
|
|
|
This monthly recording covers topics such as cyberthreat trends, nation states, cybercriminal and hacktivist campaigns, data breaches, control strategies, and exposure to...
|
|
|
Use this tool to document the roles and responsibilities associated with managing identities and access in your organization.
|
|
|
Use this tool to document the overall business, security, and privacy requirements related to your identity and access management program.
|
|
|
Define a clear IAM strategy that aligns with your organization’s security objectives and regulatory requirements; outlines the goals, roadmap, and desired outcomes of the...
|
|