Here you will find useful templates and helpful materials around the protection of your business and cyber profile, which will strength your security and vulnerability processes. These free materials are designed as useful guides to help anyone unfamiliar with what or how to protect their business environment. (Note: These are not intended as definitive materials! They’re to be used currently for reference only). You may also upload your own internal business breach, response and company protection policies here. This will allow your insurance company to better underwrite and mitigate your risk profile, while helping you be as protected as possible.
Threat and Response Awareness Templates
Cyber
E & O
D & O
Active
Data Security
Data security means protecting digital data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach.
DownloadPolicy Details
Network Security
Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.
DownloadPolicy Details
Inactive
Incident Response
An incident is an event that could lead to loss of, or disruption to, an organization's operations, services or functions. Incident management is a term describing the activities of an organization to identify, analyze, and correct hazards to prevent a future re-occurrence.
DownloadPolicy Details
Risk Assessment & Management
Broadly speaking, a risk assessment is the combined effort of: identifying and analyzing potential events that may negatively impact individuals, assets, and/or the environment; and making judgments 'on the tolerability of the risk on the basis of a risk analysis' while considering influencing factors.
DownloadPolicy Details
Active
Incident Response
An incident is an event that could lead to loss of, or disruption to, an organization's operations, services or functions. Incident management is a term describing the activities of an organization to identify, analyze, and correct hazards to prevent a future re-occurrence.
DownloadPolicy Details
Risk Assessment & Management
Broadly speaking, a risk assessment is the combined effort of: identifying and analyzing potential events that may negatively impact individuals, assets, and/or the environment; and making judgments 'on the tolerability of the risk on the basis of a risk analysis' while considering influencing factors.
DownloadPolicy Details
Inactive
Data Security
Data security means protecting digital data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach.
DownloadPolicy Details
Network Security
Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.
DownloadPolicy Details
Active
Data Security
Data security means protecting digital data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach.
DownloadPolicy Details
Risk Assessment & Management
Broadly speaking, a risk assessment is the combined effort of: identifying and analyzing potential events that may negatively impact individuals, assets, and/or the environment; and making judgments 'on the tolerability of the risk on the basis of a risk analysis' while considering influencing factors.
DownloadPolicy Details
Inactive
Network Security
Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.
DownloadPolicy Details
Incident Response
An incident is an event that could lead to loss of, or disruption to, an organization's operations, services or functions. Incident management is a term describing the activities of an organization to identify, analyze, and correct hazards to prevent a future re-occurrence.
DownloadPolicy Details
Custom Policies
Create security policies for areas not covered by our templates. You can also replace an existing policy with your own document.