- A general understanding of IT security and asset management
- Experience with security policy development and implementation
Audience
- IT administrators
- Security coordinators
- Compliance managers
Security policy management is the process of assessing, designing, and implementing rules and procedures at all levels of the organization to protect IT assets and resources.
This instructor-led, live training (online or onsite) is aimed at IT administrators, security coordinators, and compliance managers who wish to identify, evaluate, and implement security policy management methods for their organization.
By the end of this training, participants will be able to develop, manage, and monitor security policies to protect their organization's information, network, and physical and software assets.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Introduction
- Overview of Security Policy Management
- Exploring objectives and benefits of IT security policies
- The lifecycle and stages of Security Policy Management
Initiating a Security Policy Program
- Establishing a security policy team
- Assessing organizational needs and business risks
- Understanding an organization's legal requirements
- Evaluating existing security software and tools
- Addressing the different levels of the organization
- Choosing the most appropriate Security Policy Management software
Designing a Comprehensive Security Policy Program
- Core objectives of a Security Policy: Confidentiality, Integrity, Availability
- Creating a policy development and implementation checklist
- Defining the objectives, scope, and goals of a Security Policy
- Establishing consequences for not following the rules
- Tying a Security Policy to industry regulations such as PCI DSS, HIPAA, SOX, GLBA, GDPR, etc.
Case Study: Adhering to Industry Regulations
- Financial, health and other government-regulated fields
- The importance of centralized forms and templates
Implementing Security Policies
- Addressing the critical areas of IT: hardware, software, network, data, and users
- Enforcing the rules and procedures for accessing IT assets and resources
- Delegating security roles and duties
- Restricting user access
- Maintaining separate policies for different departments within an organization
- Reading, accepting, and signing the Security Policy
- Distinguishing between Privacy Policy and Public Facing Policy
Communicating Security Policies
- Designing Security Policy learning materials
- Disseminating Security Policy information to employees and management
- Carrying out security training and workshops
- Updating and adapting the Security Policy
- Cultivating a "Security Culture" within an organization
Contingency Planning
- Responding to security attacks and failures
- Establishing maintenance and recovery strategies
- Responding to litigation "attacks"
Performing Security Testing and Review
- Performing scheduled reviews (yearly, bi-annually, etc.)
- Performing a formal audit
- Decommissioning obsolete hardware, software, data and processes
- Removing obsolete or redundant security policies
- Obtaining Security Policy Management certification
Summary and Conclusion
United Arab Emirates - Security Policy Management
Qatar - Security Policy Management
Egypt - Security Policy Management
Saudi Arabia - Security Policy Management
South Africa - Security Policy Management
Brasil - Security Policy Management
Canada - Security Policy Management
中国 - Security Policy Management
香港 - Security Policy Management
澳門 - Security Policy Management
台灣 - Security Policy Management
USA - Security Policy Management
Österreich - Security Policy Management
Schweiz - Security Policy Management
Deutschland - Security Policy Management
Czech Republic - Security Policy Management
Denmark - Security Policy Management
Estonia - Security Policy Management
Finland - Security Policy Management
Greece - Security Policy Management
Magyarország - Security Policy Management
Ireland - Security Policy Management
Luxembourg - Security Policy Management
Latvia - Security Policy Management
España - Security Policy Management
Italia - Security Policy Management
Lithuania - Security Policy Management
Nederland - Security Policy Management
Norway - Security Policy Management
Portugal - Security Policy Management
România - Security Policy Management
Sverige - Security Policy Management
Türkiye - Security Policy Management
Malta - Security Policy Management
Belgique - Security Policy Management
France - Security Policy Management
日本 - Security Policy Management
Australia - Security Policy Management
Malaysia - Security Policy Management
New Zealand - Security Policy Management
Philippines - Security Policy Management
Singapore - Security Policy Management
Thailand - Security Policy Management
Vietnam - Security Policy Management
India - Security Policy Management
Argentina - Security Policy Management
Chile - Security Policy Management
Costa Rica - Security Policy Management
Ecuador - Security Policy Management
Guatemala - Security Policy Management
Colombia - Security Policy Management
México - Security Policy Management
Panama - Security Policy Management
Peru - Security Policy Management
Uruguay - Security Policy Management
Venezuela - Security Policy Management
Polska - Security Policy Management
United Kingdom - Security Policy Management
South Korea - Security Policy Management
Pakistan - Security Policy Management
Sri Lanka - Security Policy Management
Bulgaria - Security Policy Management
Bolivia - Security Policy Management
Indonesia - Security Policy Management
Kazakhstan - Security Policy Management
Moldova - Security Policy Management
Morocco - Security Policy Management
Tunisia - Security Policy Management
Kuwait - Security Policy Management
Oman - Security Policy Management
Slovakia - Security Policy Management
Kenya - Security Policy Management
Nigeria - Security Policy Management
Botswana - Security Policy Management
Slovenia - Security Policy Management
Croatia - Security Policy Management
Serbia - Security Policy Management
Bhutan - Security Policy Management