Planning the security document project Course

Exploring the best ways to plan your project.

1 hour, 23 minutes

Course description

Ideally, careful planning goes into your security policies and other documents, and this is conducted as a project with budgeted resources and time. Of course, sometimes circumstances dictate a different approach so we address that too. We walk through the pre-project process, evaluating where you are, where you need to be, who should be involved and how to gain project approval.


Planning the policy project

File - 00:10:00


Video - 00:05:00

Wrapping up our discussion on project planning. Please hold your applause until the end of this video!
Who should be on the project team and otherwise involved in the project?

Video - 00:08:00

Building and updating good policies requires a team, people doing what they are supposed to and consulting with others outside the project team.
Where are we now and where do we want to go?

Video - 00:18:00

Review the existing security documents in the organization and figure out what we need and what we can get project approval for.
Planning, scoping and selling (evangelizing) the project for better results

Video - 00:18:00

Now we really cover the 7 Ps. An overview of the conceptual steps for planning and scoping out the security document project and then evangelizing.
Planning, shmanning. We don't have time to plan, so here's a plan for that

Video - 00:11:00

Remember the 7Ps: Prior Preparation and Planning Prevents Really Poor Performance. But here's what we do when it becomes a rush job for whatever reason.
Introduction to Planning the policy project

Video - 00:13:00

Presenting this course on planning and preparing for the policy project.

Meet the author

John Bandler

John Bandler is a lawyer, consultant, speaker, teacher, and author in the areas of cybersecurity, cybercrime, privacy, investigations, and more. He is the founder of Bandler Law Firm PLLC and Bandler Group LLC, legal and consulting practices that help organizations and individuals with cybersecurity, the prevention and investigation of cybercrime, privacy, legal compliance, and more.

John has expertise in many subjects, holds a number of certifications, and is a prolific writer and speaker. He is the author of Cybersecurity for the Home and Office, a comprehensive guide to understanding and improving information security. His second book is Cybercrime Investigations, an extensive resource regarding the law, technology, process, and skills for the investigation of cybercrime. John has authored many articles on a range of topics, teaches students at the undergraduate, graduate, and law level, and provides training for professionals.

Before entering private practice, John served in government for more than twenty years as a prosecutor, police officer, and military officer. John was hired as an assistant district attorney at the New York County District Attorney’s Office by the legendary Robert M. Morgenthau, where he investigated and prosecuted the full range of offenses including traditional crime, cybercrime, the global trafficking of stolen data, and virtual currency money laundering. Before that, he served for eight years as a state trooper in the New York State Police, assigned to a busy patrol station providing full services to the local community. He also served in the Army Reserves.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust