Templates & Policies

BYOD Acceptable Use Policy

The purpose of the BYOD Acceptable Use Policy is to define standards, procedures, and restrictions for end users who are connecting a personally owned device to a company’s...

Security Stack Capability Assessment Report

A concise presentation template designed to give you a detailed snapshot of your security capabilities.

Vendor Security Process Diagram

This visual flowchart will guide you through the steps of engaging with vendors.

Vendor Security Process Template

Use this Word-based template to manage workflow, RACI matrices, and risk requirements.

Vendor Security Policy Template

This in-depth template will help you tailor your vendor security policy to your organization.

Standard End-User Entitlements and Offerings Template

A general-use template for documenting and communicating technology offerings internally.

ITAM Demonstration Script Template

Create a demo script to let vendors know what functions are important for your team.

Enterprise Device Management Strategy Template

An easily customized presentation deck to help build and communicate a clear and compelling strategy document for your key players.

AI Risk Report

Communicate the results of recent risk assessments to the senior leadership team and provide a summary of important AI risk management developments.

AI Risk Management Roadmap Presentation Template

AI Risk Management Roadmap Presentation Template
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us