Perfecting the security policy process

Phebe Waterfield, Security Analyst, Yankee Group discusses tactics for perfecting the security policy process in this presentation from Information Security Decisions.

Phebe Waterfield, Security Analyst, Yankee Group, presented this session at Information Security Decisions Fall

2005.


MORE INFORMATION

Visit our resource center for more tips and expert advice on policies

View more presentations from some of the industry's foremost security practitioners

Learn more about Information Security Decisions

The best security policies are both comprehensive and easy to understand. But creating these sorts of policies is often easier said than done. In this presentation, learn how to draft, implement and enforce an effective security policy. Discover in-the-trenches tactics for perfecting the security policy process and find out:

  • Who should be involved in creating and updating policy
  • Examples and templates of concise security policies that work
  • Helpful hints to effectively communicate a policy to employees and enforce it
  • Best practices to design policies that don't have to change by accounting for organizational growth and technology changes
  • How to update policies and determine when it's necessary to do so

Download this presentation


This was first published in October 2005

Dig deeper on Information Security Policies, Procedures and Guidelines

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close