Course Outline

Introduction

  • Overview of Security Policy Management
  • Exploring objectives and benefits of IT security policies
  • The lifecycle and stages of Security Policy Management

Initiating a Security Policy Program

  • Establishing a security policy team
  • Assessing organizational needs and business risks
  • Understanding an organization's legal requirements
  • Evaluating existing security software and tools
  • Addressing the different levels of the organization
  • Choosing the most appropriate Security Policy Management software

Designing a Comprehensive Security Policy Program

  • Core objectives of a Security Policy: Confidentiality, Integrity, Availability
  • Creating a policy development and implementation checklist
  • Defining the objectives, scope, and goals of a Security Policy
  • Establishing consequences for not following the rules
  • Tying a Security Policy to industry regulations such as PCI DSS, HIPAA, SOX, GLBA, GDPR, etc.

Case Study: Adhering to Industry Regulations

  • Financial, health and other government-regulated fields
  • The importance of centralized forms and templates

Implementing Security Policies

  • Addressing the critical areas of IT: hardware, software, network, data, and users
  • Enforcing the rules and procedures for accessing IT assets and resources
  • Delegating security roles and duties
  • Restricting user access
  • Maintaining separate policies for different departments within an organization
  • Reading, accepting, and signing the Security Policy
  • Distinguishing between Privacy Policy and Public Facing Policy

Communicating Security Policies

  • Designing Security Policy learning materials
  • Disseminating Security Policy information to employees and management
  • Carrying out security training and workshops
  • Updating and adapting the Security Policy
  • Cultivating a "Security Culture" within an organization

Contingency Planning

  • Responding to security attacks and failures
  • Establishing maintenance and recovery strategies
  • Responding to litigation "attacks"

Performing Security Testing and Review

  • Performing scheduled reviews (yearly, bi-annually, etc.)
  • Performing a formal audit
  • Decommissioning obsolete hardware, software, data and processes
  • Removing obsolete or redundant security policies
  • Obtaining Security Policy Management certification

Summary and Conclusion

Requirements

  • A general understanding of IT security and asset management
  • Experience with security policy development and implementation

Audience

  • IT administrators
  • Security coordinators
  • Compliance managers
 35 Hours

Testimonials (1)

Related Courses

Micro Focus ArcSight ESM Advanced

35 Hours

BCS Foundation Certificate in Information Security Management Principles (CISMP)

21 Hours

BCS Foundation Certificate in Information Security Management Principles (CISMP) 4 day

28 Hours

BCS Practitioner Certificate in Information Risk Management (CIRM)

35 Hours

CCTV Security

14 Hours

CipherTrust Manager

21 Hours

CISA - Certified Information Systems Auditor

28 Hours

Computer Room Security and Maintenance

14 Hours

Mastering Continuous Threat Exposure Management (CTEM)

28 Hours

Cybersecurity Fundamentals

28 Hours

DevOps Security: Creating a DevOps Security Strategy

7 Hours

Honeywell Security System

14 Hours

Building up information security according to ISO 27005

21 Hours

Applying Psychological Science to Law Enforcement

14 Hours

NB-IoT for Developers

7 Hours

Related Categories