-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
RFP Template for Information Security Projects
Tuesday, November 10, 2009
Abstract
This Request For Proposal template was created to help organizations identify and select a quality security vendor to perform professional services work. It also lists questions organizations should consider asking potential vendors to ensure that a thorough and comprehensive approach to the project will be taken. This template should apply for a variety of information security projects including:
- External Network Vulnerability Assessment and Penetration Testing
- Internal Network Vulnerability Assessment and Penetration Testing
- Web Application Penetration Testing
- Dial-In / RAS Security Testing
- DMZ or Network Architecture Designs / Reviews
- Wireless Network Assessment and Penetration Testing
- Virtual Infrastructure Security Assessment
- Server Configuration Reviews
- Firewall and Router Configuration Reviews
- VPN Configuration Reviews
- Voice over IP Assessments
- Social Engineering Assessments
- Physical Security Reviews
- Software Source Code Reviews
- Application Threat Modeling and Design Reviews
- Information Security Policy and Procedure Development or Review
- Information Security Risk Assessment
- Security Awareness Program Development or Review
- Incident Response Program Development or Review
- Secure SDLC Program Development or Review
- PCI Quarterly Scans
- PCI Report on Compliance Assessment or Gap Analysis

















