Information Security Compliance Toolkit (ISCT)

$589.00

The Information Security Compliance Toolkit (ISCT) is an incredibly in-depth, comprehensive set of information security, operational, and organizational policies, procedures, forms,provisioning and hardening documents, and other supporting templates for today's demanding businesses.  Growing cyber-security threats and ever-increasing compliance mandates are forcing businesses to get serious about information security, and it's whey the Information Security Compliance Toolkit (ISCT) was created.  Inside this professionally developed set of documents you'll find hundreds of high-quality, industry leading templates, ranging from essential security policy and procedural material, to in-depth system provisioning and hardening checklists, incident forms, user provisioning checklists, security training, and so much more. View the product data sheet to learn more about the Information Security Compliance Toolkit (ISCT) along with sample documents at the bottom of the page. Price: ($589.00) Learn more.

Available for instant download, the Information Security Compliance Toolkit (ISCT) comes complete with the following eight (8) sections:

  • Section I: Information Security Policy and Procedures Manual. Every small business needs a comprehensive information security manual, one complete with dozens of policies and procedures for ensuring I.T. best practices are in place, while also meeting growing regulatory compliance mandates. The Information Security Policy and Procedures Manual for Small Businesses comes complete with over 100 + pages of professionally developed, industry leading security documentation that’s truly second to none.  View sample documents.
  • Section II: Security Awareness Training PowerPoint (PPT) Presentation and Employee Quiz. Educating employees and workforce members on essential security issues, threats, challenges – and best practices – is now easier than ever with our in-depth PowerPoint (PPT) Presentation that include over 100 + slides of professionally developed material. Whatever your security awareness training needs are – from PCI DSS to HIPAA, and more – the Security Awareness Training PowerPoint (PPT) Presentation delivers in a big way. Additionally, you’ll also receive a 30 question quiz for testing employees’ knowledge on critical security topics.  View sample documents.
  • Section III: Security Awareness Handbook for Employees. In today’s world of growing cyber security threats and challenges, employees need a comprehensive, in-depth and high-quality reference manual for providing insight and guidance on critical security topics. And that’s exactly what the Security Awareness Handbook for Employees offers, a 65 + page document offering a laundry list of tips, advice, and guidance on the broader subject of information security.  View sample documents.
  • Section IV: Information Systems Provisioning and Hardening Checklists.  Now more than ever, it’s critically important to properly secure all of your information system assets, from essential network devices (routers and firewalls) to operating systems, and much more. The Information Systems Provisioning and Hardening Checklists included within the industry leading toolkit contains approximately 200 pages of vendor specific forms for ensuring your systems are safe and secure at all times. View sample documents.
  • Section V: Risk Management & Risk Assessment Policies and Template. Assessing risk within an organization – regardless of industry, size, or location, is becoming a must in today’s growing world of regulatory compliance. Yet even without compliance mandates, undertaking annual risk management initiatives just makes sense from a best practices perspective.  The Information Security Compliance Toolkit (ISCT) includes an in-depth, professionally developed Risk Management Policy and Procedures template, along with a comprehensive risk assessment template. Additionally, the policy document, along with the template, can be used for any of today’s well-known compliance initiatives, such as HIPAA, PCI DSS, and more.  View sample documents.
  • Section VI: Fraud Policy and Procedure Manual.  From petty larceny crimes to falsified financial statement reporting, cyber theft, and more, fraudulent activities are alive and well, being played out every day and costing businesses billions of dollars each year. The seriousness of fraud itself along with the need for organizations to have a clearly defined plan of action for fighting fraud resulted in our award winning, 101 page Fraud Policy and Procedure Manual.  start here.
  • Section VII: Business Continuity and Disaster Recovery Planning (BCDRP) Documentation.  The comprehensive BCDRP documentation includes all critical policies, procedures, and supporting initiatives for allowing organizations to properly plan and respond to adverse incidents and catastrophic events.  Authored by former military and current cyber security experts, it’s a very well-written, 42 page document that’s an absolute must-have in today’s world.  start here.
  • Section VIII: Packet of Additional Information Security Policy Templates, Supporting Forms & Checklists.  Along with the comprehensive policy manual contained in Section I, the Information Security Compliance Toolkit (ISCT) also comes complete with the following twenty-five (25) highly essential security and operational documents that every business needs. View sample documents.
    • Access Control
    • Anti-Virus and Anti-Malware
    • Asset Inventory
    • Change Control | Change Management
    • Configuration Management
    • Data and Information Classification
    • Data Backup and Recovery
    • Database Policy
    • Encryption & Key Management
    • Firewall Policy 
    • Fraud Policy
    • Incident Response
    • Internet Usage Policy
    • Personally Identifiable Information
    • Remote Access Policy
    • Removable Media Policy
    • Security and Patch Management
    • Social Media
    • Software Development Life Cycle
    • Vendor Management
    • Virtualization Policy
    • Vulnerability Management
    • Web Server Security Policy
    • Wireless Security 
    • Workstation Security

View MORE sample documents from the Information Security Compliance Toolkit (ISCT):