The next installment in the Information Security Governance Simplified Series. After covering the definition of information security governance (Ep. 7), the importance of aligning governance with the organization's mission (Ep. 8), and information security roles and responsibilities (Ep. 9), Ryan and Evan tackle information security policies in this episode (Ep. 10). - What are policies used for? - Who approves policies and policy changes? - Who maintains policies? - Which policies are considered "standard" policies? - Policy status tracking. Information security policies are critical to the success of an information security program, BUT only if they're done and used properly.
See the S2 Risk Management Platform in action.
See how SecurityStudio’s software can help you build a resilient cybersecurity infrastructure.