Main Menu
My Infosec
Main Menu
My Infosec

Information Security Policy Essentials

Information security policies are a critical element of any organization and are the foundation of its security program. This two day course provides guidance on critical information security policy elements, communicating the policy organization-wide and executive reporting.

Information Security Policy Essentials Course Overview

Effective information security policy development which leverages existing organization policies and culture has a greater chance of being approved and successfully implemented. This two day course provides guidance on critical information security policy elements, communicating the policy organization-wide and executive reporting. A basic knowledge of the interaction between business units and the supporting business information systems will be helpful for the maximum benefit from the course. Information security policies are a critical element of any organization and are the foundation of its security program. Successful security policies are built with the understanding of the organization’s culture and reflect the business’s vision and mission. Without well-written policies, organizations will discover that they have little or no recourse when a security incident occurs.

This course explores the process of creating security policies, delving into their content and organization. It reviews standards and methodologies and evaluates example policies. In the workshop you will get hands-on experience developing and reviewing information security policies. You’ll examine your organization’s culture to understand how to evaluate policies which will be accepted and effective in your own company’s environment.

What You Will Take Home

  • The tools to evaluate your own policies against your organizations needs.
  • An architecture for building custom security policies for the organization.
  • The skills to convince upper management to support and budget for security needs.

Who Should Attend

  • Business managers, project managers, security managers and auditors. Everyone responsible for the protection of corporate resources needs to understand how policies are developed.
  • Those who are responsible for creating and maintaining security policies.

Prerequisites:

  • Firm understanding of the Windows Operating System
  • Firm understanding of computer architecture concepts
  • Grasp of the TCP/IP protocols

View Pricing

We will never share any of your information, spam you or annoy you with pushy sales pitches.

What You'll LEARN:

  • How to build security policies which reflect the organization’s culture.
  • How to evaluate security policies.
  • How to create consistent policies
  • Policy versus Procedure
  • How to balance the level of specificity to the problem at hand
  • How to build business cases for security policies to get upper management ot accept and support them.

What You'll DO:

  • Examine your organization’s business objectives.

  • Determine what security principles best reflect your organization.

  • Examine what security policies will work in your company in the light of your business objectives.

Book your course

    What Our Students Are Saying

    Without any question, InfoSec has the most gifted individual instructors. Our instructor for this class was both an excellent educator and a premier/world class security expert. He was able to clearly explain and impart to the students, the most complicated security techniques I have ever heard of or imagined. I simply can not find the words to recommend him and Infosec security training more highly.
    JH

    John Hollan GE

    Advanced Ethical Hacking Training Boot Camp

    Career Tracks

    • Security Pro Track

      The Security Pro Track goes through all aspects of Information Security. Our goals with this set of courses is to create the most complete Security Specialist an organization could wish for.
    Ready to get started? Get instant pricing for this award-winning boot camp. View course pricing