Course Outline
Introduction
- Overview of Security Policy Management
- Exploring objectives and benefits of IT security policies
- The lifecycle and stages of Security Policy Management
Initiating a Security Policy Program
- Establishing a security policy team
- Assessing organizational needs and business risks
- Understanding an organization's legal requirements
- Evaluating existing security software and tools
- Addressing the different levels of the organization
- Choosing the most appropriate Security Policy Management software
Designing a Comprehensive Security Policy Program
- Core objectives of a Security Policy: Confidentiality, Integrity, Availability
- Creating a policy development and implementation checklist
- Defining the objectives, scope, and goals of a Security Policy
- Establishing consequences for not following the rules
- Tying a Security Policy to industry regulations such as PCI DSS, HIPAA, SOX, GLBA, GDPR, etc.
Case Study: Adhering to Industry Regulations
- Financial, health and other government-regulated fields
- The importance of centralized forms and templates
Implementing Security Policies
- Addressing the critical areas of IT: hardware, software, network, data, and users
- Enforcing the rules and procedures for accessing IT assets and resources
- Delegating security roles and duties
- Restricting user access
- Maintaining separate policies for different departments within an organization
- Reading, accepting, and signing the Security Policy
- Distinguishing between Privacy Policy and Public Facing Policy
Communicating Security Policies
- Designing Security Policy learning materials
- Disseminating Security Policy information to employees and management
- Carrying out security training and workshops
- Updating and adapting the Security Policy
- Cultivating a "Security Culture" within an organization
Contingency Planning
- Responding to security attacks and failures
- Establishing maintenance and recovery strategies
- Responding to litigation "attacks"
Performing Security Testing and Review
- Performing scheduled reviews (yearly, bi-annually, etc.)
- Performing a formal audit
- Decommissioning obsolete hardware, software, data and processes
- Removing obsolete or redundant security policies
- Obtaining Security Policy Management certification
Summary and Conclusion
Requirements
- A general understanding of IT security and asset management
- Experience with security policy development and implementation
Audience
- IT administrators
- Security coordinators
- Compliance managers
Delivery Options
Private Group Training
Our identity is rooted in delivering exactly what our clients need.
- Pre-course call with your trainer
- Customisation of the learning experience to achieve your goals -
- Bespoke outlines
- Practical hands-on exercises containing data / scenarios recognisable to the learners
- Training scheduled on a date of your choice
- Delivered online, onsite/classroom or hybrid by experts sharing real world experience
Private Group Prices RRP from €11400 online delivery, based on a group of 2 delegates, €3600 per additional delegate (excludes any certification / exam costs). We recommend a maximum group size of 12 for most learning events.
Contact us for an exact quote and to hear our latest promotions
Public Training
Please see our public courses
Testimonials (5)
The report and rules setup.
Jack - CFNOC- DND
Course - Micro Focus ArcSight ESM Advanced
The fact that there were practical examples with the content
Smita Hanuman - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Speed of response and communication
Bader Bin rubayan - Lean Business Services
Course - ISO/IEC 27001 Lead Implementer
The trainer was extremely clear and concise. Very easy to understand and absorb the information.
Paul Clancy - Rowan Dartington
Course - CGEIT – Certified in the Governance of Enterprise IT
I genuinely enjoyed the real examples of the trainer.