Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
- Overview of Security Policy Management
- Exploring the objectives and benefits of IT security policies
- The lifecycle and stages of Security Policy Management
Initiating a Security Policy Program
- Establishing a security policy team
- Assessing organisational needs and business risks
- Understanding an organisation's legal requirements
- Evaluating existing security software and tools
- Addressing the different levels of the organisation
- Choosing the most appropriate Security Policy Management software
Designing a Comprehensive Security Policy Program
- Core objectives of a Security Policy: Confidentiality, Integrity, Availability
- Creating a policy development and implementation checklist
- Defining the objectives, scope, and goals of a Security Policy
- Establishing consequences for non-compliance
- Aligning a Security Policy with industry regulations such as PCI DSS, HIPAA, SOX, GLBA, GDPR, etc.
Case Study: Adhering to Industry Regulations
- Financial, health, and other government-regulated sectors
- The importance of centralised forms and templates
Implementing Security Policies
- Addressing critical areas of IT: hardware, software, network, data, and users
- Enforcing rules and procedures for accessing IT assets and resources
- Delegating security roles and responsibilities
- Restricting user access
- Maintaining separate policies for different departments within an organisation
- Reading, accepting, and signing the Security Policy
- Distinguishing between Privacy Policy and Public-Facing Policy
Communicating Security Policies
- Designing Security Policy learning materials
- Disseminating Security Policy information to employees and management
- Conducting security training and workshops
- Updating and adapting the Security Policy
- Cultivating a "Security Culture" within an organisation
Contingency Planning
- Responding to security attacks and failures
- Establishing maintenance and recovery strategies
- Responding to litigation "attacks"
Performing Security Testing and Review
- Conducting scheduled reviews (yearly, bi-annually, etc.)
- Conducting a formal audit
- Decommissioning obsolete hardware, software, data, and processes
- Removing obsolete or redundant security policies
- Obtaining Security Policy Management certification
Summary and Conclusion
Requirements
- A general understanding of IT security and asset management
- Experience with security policy development and implementation
Audience
- IT administrators
- Security coordinators
- Compliance managers
35 Hours
Testimonials (4)
The trainer was helpful..
Attila - Lifial
Course - Compliance and the Management of Compliance Risk
The report and rules setup.
Jack - CFNOC- DND
Course - Micro Focus ArcSight ESM Advanced
learning about Basel
Daksha Vallabh - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Risk optimization is more clear than the other subjects