Portable Devices Configuration Standards

This document establishes all the technical security standards that must be met to properly enforce the modified Acceptable Use Policy and high-level IT governance policy as well as, of course, the Portable Devices Security Procedure.

Portable Devices Audit Checklist

Portable Devices Audit Checklist: This three-part checklist assists your technical team (or whomever is identified in your policy statement) in auditing both BYOD (authorized) devices and company-owned devices.  It includes an asset inventory as well as a checklist for smartphones, tablet pc’s, and laptops.  It makes an excellent mobile devices audit checklist! All templates are color-coded, […]

Terms and Conditions

When you pay for our IT policies and procedures templates, you are agreeing to these terms and conditions of the sale.

tp2015

Technology Planning for the Multidisciplinary Team Webinar! Webinar Resources: FFIEC Requirements IT Strategy Boilerplate IT Tactical Plan Boilerplate Policy Language Boilerplate Dan’s PowerPoint (pdf)  

NIST Webinar: Encore Presentation

  The gap is closed . . . . A free webinar about the most recent** regulations related to Incident Response! Incident Response and the NIST Cybersecurity Framework: A Drill-Down! The new NIST Cybersecurity Framework is very big on incident response.  Why?  Because the experts have been saying for decades that there is no such […]

Lemons Webinar Encore Presentation (the Director’s Cut)

FREE Lemons Webinar Encore Presentation (the Director’s Cut) Combining technical and non-technical approaches to Incident Response! If it’s a matter of when and not if, how do we prepare our management team for that scary, panicky, inevitable turn at the “breach wheel?” Dan Hadaway of infotex will share an outline of a seven step plan […]