Torus IT Security
Menu

Checklists

Cyber checklists to move into action.

Short operational lists to check important points before an audit, a risk analysis or AI-assisted document workflow.

Published checklists

Three lists to check sensitive points before execution.

01

Checklist

Checklist for preparing cyber audit evidence

A practical checklist for preparing cyber audit evidence that is readable, contextualised and defensible without piling up unnecessary documents.

  • CISOs
  • Compliance leads
  • Cybersecurity consultants
Open the checklist
02

Checklist

Checklist for scoping ISO 27005 risk analysis

A checklist for scoping ISO 27005 risk analysis in a readable, usable way that remains compatible with human validation.

  • Cybersecurity consultants
  • CISOs
  • Risk and compliance teams
Open the checklist
03

Checklist

Checklist for using a cyber assistant with client data

A checklist for framing the use of a cyber assistant with client documents, visible sources, ZDR and human validation.

  • Cybersecurity consultants
  • CISOs
  • Compliance leads
Open the checklist