Tagged - cyber security

Security Policy Lifecycle Template for Government

Use this template to build and manage your agency’s security policy lifecycle.

Security Policy Exception Request Form for Government

Use this template as a means to request and approve proposed exceptions to your security policies.

Security Governance & Management Model Tool for Government

This tool will help you determine governance and management accountabilities and responsibilities and use them to build a visual governance and management model.

Policy Exception Tracker for Government

Use this tool to help you track ongoing exceptions to your security policies.

Security Policy Exception Approval Workflow for Government

Use this workflow to help you formalize and document your policy exception approval process.

Threat Landscape Briefing – October 2024

This monthly recording covers topics such as cyberthreat trends, nation states, cybercriminal and hacktivist campaigns, data breaches, control strategies, and exposure to...

IAM Program Gap Analysis Tool

Use this tool to conduct a comprehensive assessment of your IAM program and develop a roadmap toward your target state.

IAM RACI

Use this tool to document the roles and responsibilities associated with managing identities and access in your organization.

IAM Program Requirements Gathering Tool

Use this tool to document the overall business, security, and privacy requirements related to your identity and access management program.

Develop a Comprehensive IAM Improvement Strategy – Phases 1-4

Use this research to improve the governance and operations of identity and access management at the organization. This blueprint uses the identity lifecycle as a framework...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us