CRC – Resources
CISO-Developed Resources
These comprehensive collections of templates, guides, and tools are designed to simplify and enhance cybersecurity operations. They include elements such as guidance documents, supplemental deep-dives, policy documents, workbooks, tools and templates, and virtual member briefing presentations. By leveraging these peer developed resources, Chief Information Security Officers (CISOs) can make strategic decisions more efficiently, align with industry best practices, and effectively communicate risks and progress to executive leadership.
CISO-Developed Toolkits Accessible to CRC Acceleration Program Members
Toolkits support proactive security operations, enabling faster and more organized responses to cybersecurity topics. For junior staff, resource toolkits serve as invaluable educational aids. By offering clear guidance and actionable templates, these toolkits build confidence and competency in handling cybersecurity tasks.
Toolkit: | CISO Developed Guide to Artificial Intelligence (AI) |
Cost Savings: | $12,750 – $25,500 |
Components: | Template – Business Impact Analysis |
Tool – Threat Matrix |
Toolkit: | CISO Developed Guide to Board Cybersecurity Briefing |
Cost Savings: | $21,375 – $42,750 |
Components: | A CISO Quick Guide to the Boardroom |
Supplemental Resource – Standardized Visualization Guidance | |
Supplemental Resource – Structuring & Presenting Security Data | |
Supplemental Resource – Frequently Asked Questions (FAQ) Guide for Board Q&A | |
Supplemental Resource – The Urgency to Treat Cybersecurity as a Business Decision | |
Template – Board Presentation Accompanying Handout | |
Template – Boardroom Presentation | |
Template – Presenting To The Board Of Directors | |
Template – Board Reporting After Meeting Action Tracking | |
Template – Board Reporting Checklist |
Toolkit: | CISO Developed Guide to Generative AI |
Cost Savings: | $23,000 – $46,500 |
Components: | Supplemental Resource – How to Review Generative AI |
Template – AI Compliance and Regulation Mapping Tracker | |
Template – AI Risk-Benefit Analysis Matrix | |
Supplemental Resource – Frequently Asked Questions (FAQ) Guide for Board Q&A | |
Template – Executive Briefing on Generative AI | |
Template – Information Security Standard for Generative AI | |
Template – Stakeholder Engagement Plan for AI Initiatives | |
Template – Training Data Sensitivity Audit |
Toolkit: | CISO Developed Guide to Incident Management |
Cost Savings: | $25,875 – $51,750 |
Components: | Supplemental Resource – Anatomy of a Breach |
Template – Computer Incident Response Plan | |
Template – Incident Response Checklist | |
Template – Incident Response Plan | |
Template – Incident Response Reference Architecture Definitions | |
Template – Incident Response Reference Architecture |
Toolkit: | CISO Developed Guide to Risk Assessments |
Cost Savings: | $29,000 – $60,000 |
Components: | Supplemental Resource – How to Conduct a Baseline Assessment |
Supplemental Resource – What is a Risk Assessment | |
Template – ISO 27001 ISMS Risk Assessment – Risk Treatment Standard | |
Template – Risk Assessments Maturity Checklist | |
Tool – ISO 27001 Risk Assessment Workbook | |
Tool – M&A Checklist |
Toolkit: | CISO Developed Guide to Security Metrics |
Cost Savings: | $18,750 – $37,500 |
Components: | Tool – Security Metrics Workbook |
Toolkit: | CISO Developed Guide to Vulnerability Management |
Cost Savings: | $19,500 – $29,250 |
Components: | Infographic – Key Steps to Mitigate Vulnerabilities |
Policy Document – Vulnerability Management | |
Template – Penetration Test After Action Report |
Toolkit: | CISO Developed Guide to IT Asset Management |
Cost Savings: | $25,125 – $50,250 |
Components: | Policy Document – Acceptable Use Policy |
Policy Document – Employee Equipment Use Policy | |
Supplemental Resource – Internet of Things (IoT) | |
Supplemental Resource – Preparing for BYOD In Your Workplace |
Toolkit: | CISO Developed Guide to Cloud Migration |
CISO Developed Guide to Cloud Security | |
Cost Savings: | $24,000 – $48,000 |
Components: | Supplemental Resource – Cloud Security Training Agenda |
Supplemental Resource – Handling Non-Compliant or Non-Transparent Vendors | |
Template – Checklist for Assessing Third-Party Cloud Vendors | |
Template – Cloud Security Contract Language | |
Template – Vendor Comparison | |
Tool – Cloud Migration Workbook |
Toolkit: | CISO Developed Guide to Building a Governance, Risk, and Compliance (GRC) Program |
CISO Developed Guide to Best Practices | |
Cost Savings: | $69,750 – $137,500 |
Components: | Supplemental Resource – Cloud Security Training Agenda |
Policy Document – Acceptable Use AI Policy | |
Policy Document – Acceptable Use Policy | |
Template – Cloud Security Contract Language | |
Policy Document – Data Retention Policy | |
Policy Document – Employee Equipment Use Policy | |
Policy Document – Identity and Access Management | |
Policy Document – Information Security Policy | |
Policy Document – Vulnerability Management | |
Supplemental Resource – IT Governance Playbook | |
Template – Key Security Policies |
Toolkit: | CISO Developed Guide to Ransomware |
Cost Savings: | $17,250 – $34,500 |
Components: | Tool – Planning for a Ransomware Attack |
Tool – Ransomware – Pay or Not Pay – Decision Framework | |
Tool – Ransomware Preparedness Assessment |
Toolkit: | CISO Developed Guide to SEC Cybersecurity Regulation |
Cost Savings: | $16,500 – $33,000 |
Components: | Supplemental Resource – Guidance for Completing Form 10-K Item 1C Cybersecurity |
Toolkit: | CISO Developed Guide to Attracting and Retaining Talent |
Cost Savings: | $25,500 – $51,000 |
Components: | Template – Sample Security Team Structure |
Template – Security Framework Maturity | |
Template – Security Org Chart Prototype | |
Template – Security Solution Capabilities | |
Tools – Cybersecurity Ecosystem |
Toolkit: | CISO Developed Guide to BCDR and IR in the Cloud |
Cost Savings: | $12,750 – $25,500 |
Components: | Template – Business Impact Analysis |
Tool – Threat Matrix |
Toolkit: | CISO Developed Guide to Data Privacy |
Cost Savings: | $23,000 – $48,000 |
Components: | Infographic – Complementary Controls DLP |
Infographic – DLP Best Practices | |
Infographic – Myths of DLP | |
Policy Document – Data Retention Policy | |
Supplemental Resource – Customer Information Playbook | |
Supplemental Resource – Data Loss Prevention In-Depth | |
Template – Data Security Addendum | |
Template – Privacy and Security Sanctions Email |
Toolkit: | CISO Developed Guide to Identity and Access Management |
Cost Savings: | $25,500 – $51,000 |
Components: | Policy Document – Identity and Access Management |
Supplemental Resource – Passwordless | |
Supplemental Resource – Why MFA |
Toolkit: | CISO Developed Guide to NIS2 Directive |
CISO Developed Guide to SEC Cybersecurity Regulation | |
Cost Savings: | $21,375 – $42,750 |
Components: | Supplemental Resource – Guidance for Completing Form 10-K Item 1C Cybersecurity |
Template – ISO-27001-2022-Statement-of-Applicability |
Toolkit: | CISO Developed Guide to Security Awareness, Education & Training |
CISO Developed Guide to Security Awareness Training for Remote Employees |
|
Cost Savings: | $15,000 – $30,000 |
Components: | Infographic – Common Cyber Attack Types |
Infographic – End User Tips to Avoid Being Compromised | |
Infographic -Social Engineering – Company Tips | |
Supplemental Resource – Anatomy of a Breach | |
Supplemental Resource – Social Engineering In-Depth |
Toolkit: | Guidance Document – CISO Developed Guide to DevOps Supply Chain Integrity |
Guidance Document – CISO Developed Guide to Enhancing Third-Party Risk Management | |
Guidance Document – CISO Developed Guide to Security Stack Optimization | |
Cost Savings: | $34,250 – $70,500 |
Components: | Template – IT Security Contract |
Template – Third Party Vendor Information Security Assessment | |
Template – TPRM Program Standard | |
Template- Third Party Vendor Information Security Assessment | |
TPRM\Tool – Security Stack Vendor Comparison | |
TPRM\Tool – TPRM Program Workbook |