Episode 10 - Information Security Policies
Jan 13, 2022 ·
19m 44s
Download and listen anywhere
Download your favorite episodes and enjoy them, wherever you are! Sign up or log in now to access offline listening.
Description
The next installment in the Information Security Governance Simplified Series. After covering the definition of information security governance (Ep. 7), the importance of aligning governance with the organization's mission (Ep....
show more
The next installment in the Information Security Governance Simplified Series.
After covering the definition of information security governance (Ep. 7), the importance of aligning governance with the organization's mission (Ep. 8), and information security roles and responsibilities (Ep. 9), Ryan and Evan tackle information security policies in this episode (Ep. 10).
- What are policies used for?
- Who approves policies and policy changes?
- Who maintains policies?
- Which policies are considered "standard" policies?
- Policy status tracking.
Information security policies are critical to the success of an information security program, BUT only if they're done and used properly.
show less
After covering the definition of information security governance (Ep. 7), the importance of aligning governance with the organization's mission (Ep. 8), and information security roles and responsibilities (Ep. 9), Ryan and Evan tackle information security policies in this episode (Ep. 10).
- What are policies used for?
- Who approves policies and policy changes?
- Who maintains policies?
- Which policies are considered "standard" policies?
- Policy status tracking.
Information security policies are critical to the success of an information security program, BUT only if they're done and used properly.
Information
Author | The InfoSec Mission |
Organization | InfoSec Missionaries |
Website | - |
Tags |
Copyright 2024 - Spreaker Inc. an iHeartMedia Company