Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
- Overview of Security Policy Management.
- Exploring the objectives and benefits of IT security policies.
- The lifecycle and stages of Security Policy Management.
Initiating a Security Policy Program
- Establishing a security policy team.
- Assessing organizational needs and business risks.
- Understanding legal requirements applicable to the organization.
- Evaluating existing security software and tools.
- Addressing various organizational levels.
- Selecting the most appropriate Security Policy Management software.
Designing a Comprehensive Security Policy Program
- Core objectives of a Security Policy: Confidentiality, Integrity, Availability.
- Creating a checklist for policy development and implementation.
- Defining the objectives, scope, and goals of a Security Policy.
- Establishing consequences for non-compliance.
- Aligning Security Policies with industry regulations such as PCI DSS, HIPAA, SOX, GLBA, GDPR, etc.
Case Study: Adhering to Industry Regulations
- Financial, healthcare, and other government-regulated sectors.
- The importance of centralized forms and templates.
Implementing Security Policies
- Addressing critical IT areas: hardware, software, network, data, and users.
- Enforcing rules and procedures for accessing IT assets and resources.
- Delegating security roles and responsibilities.
- Restricting user access.
- Maintaining distinct policies for different organizational departments.
- Ensuring security policies are read, accepted, and signed.
- Distinguishing between Privacy Policies and Public-Facing Policies.
Communicating Security Policies
- Designing learning materials for Security Policies.
- Disseminating Security Policy information to employees and management.
- Conducting security training and workshops.
- Updating and adapting Security Policies.
- Fostering a "Security Culture" within the organization.
Contingency Planning
- Responding to security attacks and failures.
- Establishing maintenance and recovery strategies.
- Responding to litigation-related "attacks".
Performing Security Testing and Review
- Conducting scheduled reviews (annual, bi-annual, etc.).
- Performing formal audits.
- Decommissioning obsolete hardware, software, data, and processes.
- Removing obsolete or redundant security policies.
- Obtaining Security Policy Management certification.
Summary and Conclusion
Requirements
- A foundational understanding of IT security and asset management.
- Experience in the development and implementation of security policies.
Audience
- IT administrators.
- Security coordinators.
- Compliance managers.
35 Hours
Testimonials (4)
The report and rules setup.
Jack - CFNOC- DND
Course - Micro Focus ArcSight ESM Advanced
learning about Basel
Daksha Vallabh - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Speed of response and communication
Bader Bin rubayan - Lean Business Services
Course - ISO/IEC 27001 Lead Implementer
Risk optimization is more clear than the other subjects