Episode 10 - Information Security Policies
Sign up for free
Listen to this episode and many more. Enjoy the best podcasts on Spreaker!
Download and listen anywhere
Download your favorite episodes and enjoy them, wherever you are! Sign up or log in now to access offline listening.
Description
The next installment in the Information Security Governance Simplified Series. After covering the definition of information security governance (Ep. 7), the importance of aligning governance with the organization's mission (Ep....
show moreAfter covering the definition of information security governance (Ep. 7), the importance of aligning governance with the organization's mission (Ep. 8), and information security roles and responsibilities (Ep. 9), Ryan and Evan tackle information security policies in this episode (Ep. 10).
- What are policies used for?
- Who approves policies and policy changes?
- Who maintains policies?
- Which policies are considered "standard" policies?
- Policy status tracking.
Information security policies are critical to the success of an information security program, BUT only if they're done and used properly.
Information
Author | The InfoSec Mission |
Organization | InfoSec Missionaries |
Website | - |
Tags |
Copyright 2024 - Spreaker Inc. an iHeartMedia Company