The following 186 items are listed by Content Data.
Policies & Procedures
Intranet and Internet Security Policy
This tool contains two sample policies that outline guidelines for a company's internet and intranet security.
Subscriber Content
Policies & Procedures
IT Data Management Policy
Our IT Data Management Policy outlines guidelines to ensure that critical data stored in applications and on servers is ...
Subscriber Content
Methodologies & Models
IT Operations Capability Maturity Model (CMM)
Discover how this capability maturity model can enhance your organization’s IT operations management process.
Subscriber Content
Methodologies & Models
IT Asset Management Capability Maturity Model (CMM)
Measure the maturity of your organization’s IT asset management process and guide its progress from the initial/ad-hoc s...
Subscriber Content
Articles
Human Performance Measures for Cybersecurity Operations Centers
This article offers an overview of a variety of different dimensions for measuring an analyst’s performance.
Subscriber Content
Policies & Procedures
Internal Lab Security Policy
Use the procedures included in this sample policy to govern the security of your organization’s computer/technical labs.
Subscriber Content
Policies & Procedures
User Information Security Policy
This sample policy provides guidelines for securing user information.
Subscriber Content
Audit Programs
Security Audit Work Program
Use these audit work program samples to assess the effectiveness of risk management processes and the risk levels relate...
Subscriber Content
Guides
IT Security Awareness and Training Program Guide
We've designed this guide to help companies implement and strengthen security training and awareness.
Subscriber Content
Policies & Procedures
Information Security Development Policy
This document provides an outline and framework for creating a set of policies and procedures focused on the organizatio...
Subscriber Content
Policies & Procedures
Help Desk Infrastructure Policy
This policy establishes guidelines to help assign priority levels to problems reported by end users to a company's IT de...
Subscriber Content
Articles
The 5G Effect: Lessons Learned From Real-World 5G Applications and the Road Map Ahead
This whitepaper highlights the role 5G will play in business and provides steps business leaders should take when prepar...
Subscriber Content