Cybersecurity Starter Pack

Cybersecurity Starter Pack Guide
Rigid Bits provides you with all the document templates, tools, and information you will need to adopt and implement your cyber program. Our pre-written documents are customizable, flexible, and expandable where necessary. By focusing on cybersecurity best practices, cybersecurity frameworks, and impactful actions you can take to protect your business, you will have the necessary resources to implement an effective program that meets basic data security requirements.

Security Program Plan
Outlines self-governance decisions regarding a risk-based approach to cybersecurity. Outlines applicable cybersecurity controls found in the 20 CIS Controls Framework, incident response plan, cyber liability insurance, and protection practices for non-public information and sensitive data.

Incident Response Plan
The Incident Response Plan was developed by our forensics and incident response consultants and come ready to adopt.  Easily identify the key individuals that will be engaged when an incident happens and identify any State, Federal, or other breach notification requirements that may apply.

Policies and Procedures
Specific policies and procedures are chosen by selecting high impact yet low-cost controls to implement from the 20 CIS Controls Framework. All selected controls have an associated prewritten policy, procedure, and, where applicable, a recommended free solution that can be used to satisfy the requirements of the procedure. Protects non-public information, makes it easy to respond to information requests, meets due diligence and due care requirements.

Plan of Action and Milestones
A list of controls, software, processes, and other action items your company will implement to reduce your overall risk exposure. Track your progress and add additional items to the list as your security program matures or additional compliance requirements are met.

Online Risk Assessment Tool
A web-based application that takes input about your company’s key IT systems, current security posture, and protections in place to calculate risk. The results can easily be integrated into the Security Program Plan document.

Online Vendor Security Assessment Questionnaire
An online questionnaire to provide to vendors that pose a risk to your business.  Ask your potential vendors to complete the questionnaire and share results with your business. Use these answers to determine if you will accept the risks associated with working with the vendor.