Problem solve Get help with specific problems with your technologies, process and projects.

Perfecting the security policy process

Phebe Waterfield, Security Analyst, Yankee Group discusses tactics for perfecting the security policy process in this presentation from Information Security Decisions.

Phebe Waterfield, Security Analyst, Yankee Group, presented this session at Information Security Decisions Fall...



Visit our resource center for more tips and expert advice on policies

View more presentations from some of the industry's foremost security practitioners

Learn more about Information Security Decisions

The best security policies are both comprehensive and easy to understand. But creating these sorts of policies is often easier said than done. In this presentation, learn how to draft, implement and enforce an effective security policy. Discover in-the-trenches tactics for perfecting the security policy process and find out:

  • Who should be involved in creating and updating policy
  • Examples and templates of concise security policies that work
  • Helpful hints to effectively communicate a policy to employees and enforce it
  • Best practices to design policies that don't have to change by accounting for organizational growth and technology changes
  • How to update policies and determine when it's necessary to do so

Download this presentation

This was last published in October 2005

Dig Deeper on Information security policies, procedures and guidelines

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.