Course Code: securitypolicymanagement
Duration: 35 hours
Prerequisites:
  • A general understanding of IT security and asset management
  • Experience with security policy development and implementation

Audience

  • IT administrators
  • Security coordinators
  • Compliance managers
Overview:

Security policy management is the process of assessing, designing, and implementing rules and procedures at all levels of the organization to protect IT assets and resources.

This instructor-led, live training (online or onsite) is aimed at IT administrators, security coordinators, and compliance managers who wish to identify, evaluate, and implement security policy management methods for their organization.

By the end of this training, participants will be able to develop, manage, and monitor security policies to protect their organization's information, network, and physical and software assets.

Format of the Course

  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.

Course Customization Options

  • To request a customized training for this course, please contact us to arrange.
Course Outline:

Introduction

  • Overview of Security Policy Management
  • Exploring objectives and benefits of IT security policies
  • The lifecycle and stages of Security Policy Management

Initiating a Security Policy Program

  • Establishing a security policy team
  • Assessing organizational needs and business risks
  • Understanding an organization's legal requirements
  • Evaluating existing security software and tools
  • Addressing the different levels of the organization
  • Choosing the most appropriate Security Policy Management software

Designing a Comprehensive Security Policy Program

  • Core objectives of a Security Policy: Confidentiality, Integrity, Availability
  • Creating a policy development and implementation checklist
  • Defining the objectives, scope, and goals of a Security Policy
  • Establishing consequences for not following the rules
  • Tying a Security Policy to industry regulations such as PCI DSS, HIPAA, SOX, GLBA, GDPR, etc.

Case Study: Adhering to Industry Regulations

  • Financial, health and other government-regulated fields
  • The importance of centralized forms and templates

Implementing Security Policies

  • Addressing the critical areas of IT: hardware, software, network, data, and users
  • Enforcing the rules and procedures for accessing IT assets and resources
  • Delegating security roles and duties
  • Restricting user access
  • Maintaining separate policies for different departments within an organization
  • Reading, accepting, and signing the Security Policy
  • Distinguishing between Privacy Policy and Public Facing Policy

Communicating Security Policies

  • Designing Security Policy learning materials
  • Disseminating Security Policy information to employees and management
  • Carrying out security training and workshops
  • Updating and adapting the Security Policy
  • Cultivating a "Security Culture" within an organization

Contingency Planning

  • Responding to security attacks and failures
  • Establishing maintenance and recovery strategies
  • Responding to litigation "attacks"

Performing Security Testing and Review

  • Performing scheduled reviews (yearly, bi-annually, etc.)
  • Performing a formal audit
  • Decommissioning obsolete hardware, software, data and processes
  • Removing obsolete or redundant security policies
  • Obtaining Security Policy Management certification

Summary and Conclusion

Sites Published:

United Arab Emirates - Security Policy Management

Qatar - Security Policy Management

Egypt - Security Policy Management

Saudi Arabia - Security Policy Management

South Africa - Security Policy Management

Brasil - Security Policy Management

Canada - Security Policy Management

中国 - Security Policy Management

香港 - Security Policy Management

澳門 - Security Policy Management

台灣 - Security Policy Management

USA - Security Policy Management

Österreich - Security Policy Management

Schweiz - Security Policy Management

Deutschland - Security Policy Management

Czech Republic - Security Policy Management

Denmark - Security Policy Management

Estonia - Security Policy Management

Finland - Security Policy Management

Greece - Security Policy Management

Magyarország - Security Policy Management

Ireland - Security Policy Management

Luxembourg - Security Policy Management

Latvia - Security Policy Management

España - Security Policy Management

Italia - Security Policy Management

Lithuania - Security Policy Management

Nederland - Security Policy Management

Norway - Security Policy Management

Portugal - Security Policy Management

România - Security Policy Management

Sverige - Security Policy Management

Türkiye - Security Policy Management

Malta - Security Policy Management

Belgique - Security Policy Management

France - Security Policy Management

日本 - Security Policy Management

Australia - Security Policy Management

Malaysia - Security Policy Management

New Zealand - Security Policy Management

Philippines - Security Policy Management

Singapore - Security Policy Management

Thailand - Security Policy Management

Vietnam - Security Policy Management

India - Security Policy Management

Argentina - Security Policy Management

Chile - Security Policy Management

Costa Rica - Security Policy Management

Ecuador - Security Policy Management

Guatemala - Security Policy Management

Colombia - Security Policy Management

México - Security Policy Management

Panama - Security Policy Management

Peru - Security Policy Management

Uruguay - Security Policy Management

Venezuela - Security Policy Management

Polska - Security Policy Management

United Kingdom - Security Policy Management

South Korea - Security Policy Management

Pakistan - Security Policy Management

Sri Lanka - Security Policy Management

Bulgaria - Security Policy Management

Bolivia - Security Policy Management

Indonesia - Security Policy Management

Kazakhstan - Security Policy Management

Moldova - Security Policy Management

Morocco - Security Policy Management

Tunisia - Security Policy Management

Kuwait - Security Policy Management

Oman - Security Policy Management

Slovakia - Security Policy Management

Kenya - Security Policy Management

Nigeria - Security Policy Management

Botswana - Security Policy Management

Slovenia - Security Policy Management

Croatia - Security Policy Management

Serbia - Security Policy Management

Bhutan - Security Policy Management

Nepal - Security Policy Management

Uzbekistan - Security Policy Management