Information Security Policy Development Dos and Don’ts

Why Should You Attend:

Information security policies provide a structure for best practice that can be followed by all employees. They help to ensure risk is minimized and that any security incidents are effectively responded to. Although the importance of information security for businesses is increasingly recognized, the complexity of issues involved means that the size and shape of information security policies may vary widely from company to company.

It should be noted that there is no single method for developing an information security policy or policies. Many factors must be taken into account, including audience type and company business and size, the maturity of the policy development process currently in place. A company which currently has no information security policy or only a very basic one may initially use a different strategy than a company which already has a substantial policy framework in place, but wants to tighten it up and start to use policy for more complex purposes such as to track compliance with legislation.

This webinar will provide valuable assistance to all organizations that need to develop and maintain information security policies. The focus will be upon creating an outline of the process tasks that need to be completed—without confusing everyone with “policy” jargon.

Areas Covered in the Webinar:

The webinar will cover the following areas:

  1. Why do you need information security policies?
  2. Who is using your information security policies?
  3. Different Types of Policies
  4. Different Policy Topics
  5. Policy Development Process
  6. Policy Development Team
  7. Policy Development Lifecycle
  8. Policy Document Outline
  9. Issues the arise with respect to policy development and implementation.

Who will Benefit:

This topic applies to personnel in any organization that needs to develop and implement information security policies. The employees who will benefit most include:

  • Senior management,
  • IT Security Managers,
  • IT Auditors, and
  • IT Security Compliance, and
  • Risk Managers

For Registration:http://www.complianceonline.com/ecommerce/control/trainingFocus/~product_id=702599?channel=limsfinder