91ÖÆÆ¬³§

Tagged - security

Equipment Use Policy

The equipment use policy has been designed to inform employees/end users of best practices and policies to protect company-owned equipment and sensitive data stored on the...

Server Backup Policy

The server backup policy protects data from loss or destruction in IT departments within companies. Without a server backup policy, a company’s assets are not as safe as...

Security Governance and Management Challenge Analysis Tool

Use this tool to help you organize and prioritize your current security governance and management challenges.

ISO 27001:2013 Annex A Self-Check List

Use this check list to assess your CMM level based on ISO 27001:2013.

Security Service Catalog Template

Use this catalog template to create a formal list of information security services offered and service level agreements.

Security Governance and Management Communication Plan

This template will help you organize your various security communication efforts with different stakeholders.

Information Security Incident Response Process Template

Use this template to define a specific process for managing information security incidents to minimize their impact on the organization.

National Security

​I recently had the opportunity to listen and talk with many of the national leaders in defense, intelligence, and security, from the US and several of its key allies and...

Special Letter: Designing the Next Internets

Most informed telecoms engineers (and technically sophisticated Net users) have come to the conclusion that security on the Internet, as it's designed today, ranges from...

Information Security Awareness and Training Appropriateness Tool

Use this tool to allow you to determine your organization's specific appropriateness for having a security awareness and training program.
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us