Cybersecurity Complete Suit
A structured set of dashboards, trackers and security documents to manage cyber risks, monitor infrastructure and keep your organisation ready for audits — all built in Excel.
Visualise incidents, risks, vulnerabilities and compliance metrics in one consolidated view.
10+ ready-made dashboards included
Use dashboards as your central cockpit — feed in your logs and trackers, and present cyber posture in minutes.
Dashboards included (10)
The suite gives you a complete view across infrastructure, applications and performance:
- Cybersecurity Dashboard
- Cloud Security Dashboard
- Network Security Dashboard
- Information Security Dashboard
- Information Security KPI Dashboard
- Application Security Dashboard
- Network Traffic Monitoring Dashboard
- Server Monitoring Dashboard
- System Performance Report Dashboard
- Network Performance Dashboard
Templates Library – complete cybersecurity toolkit
A full library of trackers, logs, matrices and policy documents that connect directly to your dashboards.
Total templates included
You get a rich library of 50+ ready-to-use templates across all major cybersecurity domains:
- Dashboards: Cyber, cloud, network, information security, application security & performance
- Trackers & logs: incidents, vulnerabilities, patching, traffic, access, DR records and more
- Matrices & registers: risk, access control, asset inventory, classification, DR assets
- Policies & process docs: ISMS, acceptable use, password, BYOD, DR, incident & problem management
Cloud Security Templates
Cloud · 5+ templatesTrack cloud assets, access, backups and incidents in one set of sheets.
- Cloud Access Control Matrix
- Cloud Asset Inventory Tracker
- Cloud Backup & Recovery Testing Tracker
- Cloud Incident Response Log
- Cloud Security Configuration Baseline
Network Security Templates
Network · 8+ templatesKeep devices, traffic, patching and events under control.
- DDoS Attack Mitigation Plan Tracker
- IP Whitelist / Blacklist Tracker
- Network Access Control Log
- Network Device Inventory
- Network Security Risk Mitigation Report
- Network Traffic Monitoring Dashboard Sheet
- Patch Management Schedule (network devices)
- Security Event Correlation Tracker
- VPN Usage Log
Information Security Templates
InfoSec · 10+ templatesFocus on data, access and policy compliance.
- Information Security Dashboard Sheet
- Information Security KPI Dashboard Sheet
- Access Rights & Permissions Matrix
- Data Breach Notification Log
- Data Classification Register
- DLP Incident Log
- Document Retention & Disposal Tracker
- Encryption Key Management Sheet
- Incident Reporting & Tracking Sheet
- Information Security Policy Compliance Checklist
Application Security Templates
AppSec · 10+ templatesPlan and track security for web, mobile and internal apps.
- Application Security Dashboard Sheet
- Application Data Encryption Checklist
- Application Risk Assessment Matrix
- Application Threat Modeling Sheet
- Authentication & Authorization Control Sheet
- Patch & Update Tracker
- Secure Coding Checklist
- Secure Mobile App Testing Tracker
- Security Misconfiguration Log
- Static Code Analysis Log
- Web Application Vulnerability Tracker
Security Management Documents
Governance & DR · 15+ templatesPolicy and process templates to support ISMS, incident management and disaster recovery.
- Acceptable Use of Assets
- Password Policy
- Backup & Recovery Policy
- BYOD Policy
- Compliance Management Template
- Disposal & Destruction Policy
- Information Classification Policy
- Information Transfer Policy
- ISMS Policy
- IT Asset Management Policy Template
- Mobile Devices & Teleworking Policy
- Incident Management Guide
- Incident Management Policy & Process
- Internal Incident Report Templates
- Major Incident Report Template
- Structure Damage Incident Report
- Workplace Violence Report
- Problem Management Process & Records
- Problem Record Templates
- DR Approach Document
- DR Asset Register
- DR Closure Report
- DR Communications Plan
- DR Plan Template
Benefits – why teams choose this suite
Build a practical, measurable cybersecurity practice without wasting weeks designing dashboards and documents.
Ready-made structure
Stop fighting with blank spreadsheets. Use proven layouts and KPIs — just plug in your assets, incidents and controls, and adjust as needed.
Dashboards that tell the story
Turn raw logs into views that management can understand: top risks, open issues, patch status and trends over time.
Evidence in one place
Logs, policies and DR records are organised so you can quickly pull evidence for internal reviews, external auditors or certifications.
Excel & Google Sheets only
The whole suite runs in tools your teams already use. No extra licenses, complex deployments or training required.
Adapt to your environment
Change fields, add columns, adjust formulas and apply your own scoring methods so the suite maps directly to your processes.
Standard way of working
Use the same dashboards and documents across teams and projects, so reports look consistent month after month.
Who is this for?
Built for security, IT and risk professionals who want clarity and structure without building everything from scratch.
CISOs & Heads of Security
Use dashboards and KPI views to support steering committees, board updates and risk reviews with clear, up-to-date numbers.
IT & Infrastructure Teams
Track network devices, VPNs, cloud assets, backups and DR plans with structured trackers that fit your operational reality.
Security Analysts & Engineers
Maintain incident logs, vulnerability lists, patch trackers and access matrices in a format that rolls up cleanly into dashboards.
Risk & Compliance Teams
Keep policies, evidence and compliance checklists aligned with KPIs and incident records for audits and certifications.
Consultants & vCISOs
Standardise your client deliverables with a reusable Excel toolkit that you can adapt for each engagement.
SMBs without big tools
Small and medium organisations that don’t have GRC or SIEM platforms can still run a disciplined, dashboard-driven cybersecurity practice.
From chaos to clarity – problem & solution
Most teams already have the data, but not the structure. This suite bridges that gap.
Scattered spreadsheets and manual reporting
Incidents in one file, assets in another, policies in shared folders, ad-hoc slides before every review. Reporting becomes a last-minute fire drill, and it’s hard to show progress over time.
- No single view of cyber risk and posture
- Inconsistent templates across teams
- Difficulty answering audit questions quickly
A single, structured cybersecurity toolkit
The Cybersecurity Complete Suit gives you dashboards, trackers and documents designed to work together: capture data once, reuse it for reporting, decision-making and evidence.
- 10+ dashboards across cloud, network, apps and performance
- Category-wise trackers and policy documents
- Consistent layout that any team member can follow
How it works
You can be up and running in less than an hour using only Excel or Google Sheets.
Purchase & download
Complete your purchase via Gumroad and download the bundle with dashboards, trackers and documents.
Open in Excel or Sheets
Start with the dashboards most relevant for you (cloud, network, information security, etc.) and insert your data.
Customise & present
Tweak fields, scoring and colours, then share views with management, auditors and technical teams.
Frequently asked questions
Still unsure? These are the most common questions we receive about the suite.
Build a clear, dashboard-driven cybersecurity practice
Instead of spending weeks designing spreadsheets and slides, start from a proven structure designed for CISOs, IT and security teams — and focus your time on reducing risk.