0 Reviews
$4,120.00 $3,296.00
(You save $824.00)
SKU:
PCI-B2
Availability:
Email Delivery Within 1-2 Business Days

PCI Bundle 2: PCI-VCP-VPMP-CIRP

Maximum file size is 4.88 MB, file types are jpg, gif, tiff, bmp

PCI Bundle #2 - 20% discount

Products Included in The PCI Bundle #2 

This bundle provides comprehensive documentation to make a solid PCI DSS compliance program that addresses risk management, third-party service providers and patch management. 

PCI DSS Policy & Standards (PCI)

  • The PCI DSS Policy and Standards addresses the “what?” and “why?” questions for how your company manages PCI DSS compliance. It contains one policy and multiple standards that are specifically designed to comply with PCI DSS requirements.
  • This is an editable Microsoft Word document that you can edit for your own specific needs.
  • Policies and standards are a core requirement to comply with PCI DSS. 

Vendor Compliance Program (VCP)

  • The VCP addresses the “how?” questions for how your company manages risk with third parties (e.g., service provides, vendors, contractors, etc.).
  • This is an editable Microsoft Word document that is essentially a document that is intended to be shared with third parties, as compared to sharing detailed policies and standards.
  • The VCP contains concise cybersecurity-related expectations that your company expects your third parties to abide by.
  • The text from the VCP can be used in a contract addendum or shared as a stand-alone document.
  • The VCP helps provide evidence of due care in how your company informs third parties about their cybersecurity obligations.

Cybersecurity Incident Response Program (CIRP)

  • The CIRP addresses the “how?” questions for how your company manages cybersecurity incidents.
  • This is primarily an editable Microsoft Word document, but it comes with Microsoft Excel and Microsoft Visio templates.
  • In summary, this addresses fundamental needs when it comes to incident response requirements:
    • Defines the hierarchical approach to handling incidents.
    • Categorizes eleven different types of incidents and four different classifications of incident severity.
    • Defines the phases of incident response operations, including deliverables expected for each phase.
    • Defines the Integrated Security Incident Response Team (ISIRT) to enable a unified approach to incident response operations.
    • Defines the scientific method approach to incident response operations.
    • Provides guidance on how to write up incident reports (e.g., lessons learned).
    • Provides guidance on forensics evidence acquisition.
    • Identifies and defines Indicators of Compromise (IoC).
    • Identifies and defines sources of evidence.   
  • The CIRP contains “tabletop exercise” scenarios, based on the categories of incidents.
  • This helps provide evidence of due care in how your company handles cybersecurity incidents.
  • The CIRP is based on leading frameworks, such as NIST 800-37, NIST 800-39, ISO 31010 and COSO 2013.

Vulnerability & Patch Management Program (VPMP)

  • The VPMP addresses the “how?” questions for how your company manages technical vulnerabilities and patch management operations.
  • This is an editable Microsoft Word document that provides program-level guidance to directly supports the WISP and DSP policies and standards for managing vulnerabilities.
  • In summary, this addresses fundamental needs when it comes to vulnerability management requirements:
    • Who is responsible for managing vulnerabilities.
    • What is in scope for patching and vulnerability management.
    • Defines the vulnerability management methodology.
    • Defines timelines for conducting patch management operations.
    • Considerations for assessing risk with vulnerability management.
    • Vulnerability scanning and penetration testing guidance.
    • Information Assurance (IA) guidance to support secure engineering activities.

Reviews

Find Out Exclusive Information On Cybersecurity