The following 185 items are listed by Content Data.
Methodologies & Models
IT Asset Management Capability Maturity Model (CMM)
Measure the maturity of your organization’s IT asset management process and guide its progress from the initial/ad-hoc s...
Subscriber Content
Articles
Human Performance Measures for Cybersecurity Operations Centers
This article offers an overview of a variety of different dimensions for measuring an analyst’s performance.
Subscriber Content
Policies & Procedures
Internal Lab Security Policy
Use the procedures included in this sample policy to govern the security of your organization’s computer/technical labs.
Subscriber Content
Audit Programs
Security Audit Work Program
Use these audit work program samples to assess the effectiveness of risk management processes and the risk levels relate...
Subscriber Content
Guides
IT Security Awareness and Training Program Guide
We've designed this guide to help companies implement and strengthen security training and awareness.
Subscriber Content
Policies & Procedures
Information Security Development Policy
This document provides an outline and framework for creating a set of policies and procedures focused on the organizatio...
Subscriber Content
Policies & Procedures
Help Desk Infrastructure Policy
This policy establishes guidelines to help assign priority levels to problems reported by end users to a company's IT de...
Subscriber Content
Articles
The 5G Effect: Lessons Learned From Real-World 5G Applications and the Road Map Ahead
This whitepaper highlights the role 5G will play in business and provides steps business leaders should take when prepar...
Subscriber Content
Policies & Procedures
Security and Access Policy
This Security and Access Policy provides a company with a single reference for governance pertaining to matters of secur...
Subscriber Content
Policies & Procedures
Password Security Policy
Use the four sample policies included in this tool to establish your company’s guidelines regarding secure and consisten...
Subscriber Content
Methodologies & Models
Security Management Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s security management process and ...
Subscriber Content
Audit Programs
Business Continuity Management Audit Work Program
This BCM work program includes two samples that will help you assess the effectiveness of your BCM program and identify ...
Subscriber Content