Skip to main content
logo

Response Plans

Here you will find useful templates and helpful materials around the protection of your business and cyber profile, which will strength your security and vulnerability processes. These free materials are designed as useful guides to help anyone unfamiliar with what or how to protect their business environment. (Note: These are not intended as definitive materials! They’re to be used currently for reference only). You may also upload your own internal business breach, response and company protection policies here. This will allow your insurance company to better underwrite and mitigate your risk profile, while helping you be as protected as possible.

Threat and Response Awareness Templates

Active

Data Security

Data security means protecting digital data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach.

Network Security

Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.
Inactive

Incident Response

An incident is an event that could lead to loss of, or disruption to, an organization's operations, services or functions. Incident management is a term describing the activities of an organization to identify, analyze, and correct hazards to prevent a future re-occurrence.

Risk Assessment & Management

Broadly speaking, a risk assessment is the combined effort of: identifying and analyzing potential events that may negatively impact individuals, assets, and/or the environment; and making judgments 'on the tolerability of the risk on the basis of a risk analysis' while considering influencing factors.

Custom Policies

Create security policies for areas not covered by our templates. You can also replace an existing policy with your own document.