Security Operations - Templates & Policies

Information Security Incident Management Plan

Formalize the security incident management program by defining a central, high-level guide to describe goals, roles, and responsibilities, as well as the process that...

Incident Management Runbook: Credential Compromise

Incidents can be categorized into runbooks for which a standardized response process can be defined, eliminating inconsistency and ambiguity while increasing operational...

Incident Management Runbook: Distributed Denial of Service

Incidents can be categorized into runbooks for which a standardized response process can be defined, eliminating inconsistency and ambiguity while increasing operational...

Incident Management Runbook: Malware

Incidents can be categorized into runbooks for which a standardized response process can be defined, eliminating inconsistency and ambiguity while increasing operational...

Security Incident Management RACI Tool

Assign responsibilities and deadlines for incident response and the management process.

Incident Management Runbook: Malicious Email

Incidents can be categorized into runbooks for which a standardized response process can be defined, eliminating inconsistency and ambiguity while increasing operational...

Incident Management Runbook: Ransomware

Incidents can be categorized into runbooks for which a standardized response process can be defined, eliminating inconsistency and ambiguity while increasing operational...

Endpoint Protection Request for Proposal

An RFP is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of requirements.

Endpoint Protection Vendor Demo Script

This template is designed to provide EPP vendors with a consistent set of instructions, ensuring an objective comparison of product features, all while evaluating ease of...

Endpoint Protection Metrics Summary Template

Identify relevant metrics to assist in evaluating the success of your organization's endpoint protection process.
GET HELP Contact Us
×
VL Methodology