External guidance to assist with security policiesHow to choose the correct guidance for your organization.
Course descriptionSecurity professionals need to be careful what guidance we select and how we adapt it to our company’s unique needs. We will review many sources for such guidance, including from government, cybersecurity frameworks, publicly available templates or policies, resources and tools.
File - 00:10:00
Video - 00:08:00
Wrapping up our discussion about external guidance.
Tools to assist with creating and managing policies
Video - 00:18:00
There are an infinite number of paid and proprietary tools marketed to help with this process. We're not selling or recommending any, just discussing them and how they might fit in.
Books, articles and other resources
Video - 00:09:00
There's plenty of guidance out there, including books and articles. Here are some tips to find good ones.
Video - 00:25:00
We talk about the ultimate in detailed cybersecurity guidance: frameworks from respected organizations.
Finding good sample infosec policies from the internet
Video - 00:11:00
The internet has lots of sample policies. Here are some tips on where to find quality samples. Remember, you cannot simply copy and paste for your organization!
Government regulatory guidance
Video - 00:14:00
Government created a lot of rules for us, and they also provide guidance on how to follow them. Let's talk about that.
External guidance to assist with security policies overview
Video - 00:09:00
We already talked about laws (external rules). Now, let's discuss guidance that might be helpful for us.
External guidance skill assessment
Assessment - 5 questions
Plans & pricing
- Team administration and reporting
- Dedicated client success manager
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps