Cyber and IT Policy Pack

from $500.00

Good governance over Cyber and IT practices has never been more critical than it is today. Thankfully we have done the hard work to prepare a comprehensive set of policies to cover your every need. Choose the policy you need or select from three policy packs to get full policy coverage.

Remember;

  1. Policy outlines the objectives.

  2. Documented practices or procedures make the policy objectives executable.

  3. Standards make the policy objectives measurable.

If you need any help customising your policies, developing procedures, establishing standards or you need a policy that is not detailed in our pack, just reach out using the ‘contact us’ form.

Policies:

Policy Deployment Guidelines

  1. Information Security Strategy

  2. Acceptable Use

  3. Data Governance

  4. Electronic Communications

  5. Incident & Data Breach Response

  6. Patch Management

  7. Passwords

  8. Remote Access & Remote Working

  9. Technology Standards

  10. Change Management

  11. External Privacy & Information Statement

  12. Information Security Management

  13. Mobile Devices, BYOD & Wearables

  14. Media Destruction, Retention & Back Ups

  15. Security & Awareness Training

  16. Vendor & Supplier Management

  17. Disaster Recovery & Business Continuity Plan

  18. Cloud Computing Policy

  19. IT Onboarding and Offboarding Policy

    1. User Offboarding Agreement

  20. User Access and Management Policy

  21. Incident Response Plan

    1. Incident Response Procedure Template

  22. Comprehensive Cyber Incident Response Plan

    1. Cyber Incident Response Template

  23. Software Development & Integrations Policy

  24. Artificial Intelligence Policy

Good governance over Cyber and IT practices has never been more critical than it is today. Thankfully we have done the hard work to prepare a comprehensive set of policies to cover your every need. Choose the policy you need or select from three policy packs to get full policy coverage.

Remember;

  1. Policy outlines the objectives.

  2. Documented practices or procedures make the policy objectives executable.

  3. Standards make the policy objectives measurable.

If you need any help customising your policies, developing procedures, establishing standards or you need a policy that is not detailed in our pack, just reach out using the ‘contact us’ form.

Policies:

Policy Deployment Guidelines

  1. Information Security Strategy

  2. Acceptable Use

  3. Data Governance

  4. Electronic Communications

  5. Incident & Data Breach Response

  6. Patch Management

  7. Passwords

  8. Remote Access & Remote Working

  9. Technology Standards

  10. Change Management

  11. External Privacy & Information Statement

  12. Information Security Management

  13. Mobile Devices, BYOD & Wearables

  14. Media Destruction, Retention & Back Ups

  15. Security & Awareness Training

  16. Vendor & Supplier Management

  17. Disaster Recovery & Business Continuity Plan

  18. Cloud Computing Policy

  19. IT Onboarding and Offboarding Policy

    1. User Offboarding Agreement

  20. User Access and Management Policy

  21. Incident Response Plan

    1. Incident Response Procedure Template

  22. Comprehensive Cyber Incident Response Plan

    1. Cyber Incident Response Template

  23. Software Development & Integrations Policy

  24. Artificial Intelligence Policy

a: