Template library
Explore our collection of templates designed for a range of collaborative risk management scenarios.
Did not find a readily available template that fits your requirements? Don't worry—Inclus offers complete flexibility to support any process or unique use case.
Reach out to us, and let’s build a custom template for your specific purposes.
IT Project Risk Management
Implementing IT projects involves navigating complexities that can significantly impact the project’s success. Effective risk management is crucial in ensuring these projects are delivered on time, within budget, and meet the intended objectives.
ISO 27001 Related Templates
Inclus' suite of ISO 27001 templates, is designed to help you on your journey towards ISO 27001 certification, and to streamline your information security management processes. This comprehensive set includes the ISO 27001 Maturity Assessment, ISO 27001 Asset-Based Information Security Risk Assessment, and ISO 27001 Controls Assessment.
Cyber Threat Assessment
The Cyber Threat Assessment Template from Inclus is an essential tool for safeguarding your organization against cyber threats. By proactively identifying, assessing, and managing risks, this template helps you build a robust cybersecurity strategy that protects your assets and data.
Data Protection Impact Assessment (DPIA)
Ensure your organization’s data privacy and compliance with the Data Protection Impact Assessment (DPIA) Template from Inclus. This template helps you systematically identify, assess, and mitigate risks related to data protection.
Cybermeter
Map out and manage cyber threats with Inclus' digital Cybermeter, created in collaboration with the National Cyber Security Centre. Providing a user-friendly and comprehensive solution for identifying, evaluating, and managing cyber risks across your organization.
NIS2 Maturity Gap Analysis
Prepare your organization for the upcoming NIS2 EU directive. With the NIS2 Maturity Gap Analysis Template from Inclus, you can systematically assess your organization's cybersecurity maturity and identify gaps that need to be addressed to meet the directive's requirements.